Public Key Infrastructure

Public Key Infrastructure

Professional Development

10 Qs

quiz-placeholder

Similar activities

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Azure Cloud computing

Azure Cloud computing

Professional Development

10 Qs

GRAND OPENING INTERNSHIP EXERCISE 2024

GRAND OPENING INTERNSHIP EXERCISE 2024

Professional Development

13 Qs

C String Array MCQs

C String Array MCQs

Professional Development

10 Qs

Unix Fundamentals

Unix Fundamentals

Professional Development

10 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

How are you doing?

How are you doing?

Professional Development

10 Qs

AWS ACF Módulo 1  - Visão geral dos conceitos de nuvem

AWS ACF Módulo 1 - Visão geral dos conceitos de nuvem

Professional Development

10 Qs

Public Key Infrastructure

Public Key Infrastructure

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 37+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are asked by the senior system administrator to refresh the SSL certificates on the web servers. The process is to generate a certificate signing request (CSR), send it to a third party to be signed, and then apply the return information to the CSR. What is this an example of?

Pinning

Borrowed authority

Third-party trust model

Stapling

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A certificate authority consists of which of the following?

Hardware and software

Policies and procedures

People who manage certificates

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your manager wants you to review the company’s internal PKI system’s CPS for applicability and verification and to ensure that it meets current needs. What are you most likely to focus on?

Revocations

Trust level provided to users

Key entropy

How the keys are stored

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are preparing an e-mail to send to a colleague at work, and because the message information is sensitive, you decide you should encrypt it. When you attempt to apply the certificate that you have for the colleague, the encryption fails. The certificate was listed as still valid for another year, and the certificate authority is still trusted and working. What happened to this user’s key?

It was using the wrong algorithm.

You are querying the incorrect certificate authority

It was revoked

The third-party trust model failed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a requirement for a CRL?

It must have the e-mail addresses of all the certificate owners. 

It must contain a list of all expired certificates.

It must contain information about all the subdomains covered by the CA.

It must be posted to a public directory.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does OCSP do?

It reviews the CRL for the client and provides a status about the certificate being validated.

 It outlines the details of a certificate authority, including how identities are verified, the steps the CA follows to generate certificates, and why the CA can be trusted.

It provides for a set of values to be attached to the certificate.

It provides encryption for digital signatures.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The X.509 standard applies to which of the following?

SSL providers

Digital certificates

Certificate revocation lists

Public key infrastructure

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?