certificates Flashcards

1
Q

Question: What is the primary purpose of a digital certificate in cryptography?

A) Data encryption
B) Secure authentication
C) File compression
D) Network routing

A

Answer: B) Secure authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question: Which cryptographic concept is at the core of digital certificates?

A) Symmetric encryption
B) Asymmetric encryption
C) Hash functions
D) Random number generation

A

Answer: B) Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question: In a Public Key Infrastructure (PKI), who issues digital certificates to entities?

A) Certificate Authorities (CAs)
B) Internet Service Providers (ISPs)
C) Domain registrars
D) Web browsers

A

Answer: A) Certificate Authorities (CAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question: Which type of key pair is typically used in digital certificates?

A) Public and private key pair
B) Symmetric key pair
C) Hashed key pair
D) Shared key pair

A

Answer: A) Public and private key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question: What information does a digital certificate typically contain?

A) Entity’s favorite color
B) Entity’s public key
C) Entity’s login password
D) Entity’s physical address

A

Answer: B) Entity’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question: What is the role of the private key associated with a digital certificate?

A) Encrypt data for secure transmission
B) Verify the authenticity of the entity
C) Decrypt data encrypted with the public key
D) Publish the certificate in a public directory

A

Answer: C) Decrypt data encrypted with the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question: Which protocol is commonly used for secure transmission of digital certificates?

A) HTTP
B) SMTP
C) HTTPS
D) FTP

A

Answer: C) HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question: What is the primary benefit of using digital certificates for authentication?

A) Faster data transmission
B) Elimination of encryption keys
C) Increased data storage capacity
D) Assurance of entity identity

A

Answer: D) Assurance of entity identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question: In the context of digital certificates, what does “CA” stand for?

A) Certificate Access
B) Central Authority
C) Cryptographic Algorithm
D) Certificate Authorization

A

Answer: B) Central Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question: Which cryptographic algorithm is often used in the creation of digital certificates?

A) RSA
B) DES
C) AES
D) MD5

A

Answer: A) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question: What is the primary purpose of the “Certificate Revocation List” (CRL)?

A) To issue new certificates
B) To store private keys
C) To list revoked certificates
D) To encrypt data

A

Answer: C) To list revoked certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question: How does a digital certificate help prevent man-in-the-middle attacks?

A) By encrypting the entire communication
B) By providing a secure channel for data transmission
C) By verifying the authenticity of communication parties
D) By increasing the data transfer speed

A

Answer: C) By verifying the authenticity of communication parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question: What is the primary goal of the X.509 standard for digital certificates?

A) To define a common format for digital certificates
B) To regulate internet domain names
C) To establish encryption algorithms
D) To create a public directory of certificates

A

Answer: A) To define a common format for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question: Which entity is responsible for validating the identity of certificate applicants before issuing digital certificates?

A) Internet Service Provider (ISP)
B) Certificate Authority (CA)
C) Web browser
D) Domain registrar

A

Answer: B) Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question: What is the term for the process of verifying the authenticity and validity of a digital certificate?

A) Certificate issuance
B) Certificate revocation
C) Certificate validation
D) Certificate expiration

A

Answer: C) Certificate validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question: What is the recommended method for securely storing a private key associated with a digital certificate?

A) Print it on paper
B) Store it in a plain text file
C) Use hardware security modules (HSMs)
D) Share it with trusted colleagues

A

Answer: C) Use hardware security modules (HSMs)

17
Q

Question: Which encryption method is commonly used to protect the private key during the transmission of a digital certificate?

A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Compression

A

Answer: B) Asymmetric encryption

18
Q

Question: In a digital certificate, what does the “subject” field typically represent?

A) The issuing Certificate Authority (CA)
B) The public key of the entity
C) The entity to which the certificate is issued
D) The expiration date of the certificate

A

Answer: C) The entity to which the certificate is issued

19
Q

Question: Which organization is responsible for defining and maintaining the standards for the X.509 certificate format?

A) International Organization for Standardization (ISO)
B) Internet Engineering Task Force (IETF)
C) Internet Corporation for Assigned Names and Numbers (ICANN)
D) World Wide Web Consortium (W3C)

A

Answer: B) Internet Engineering Task Force (IETF)

20
Q

Question: What is the primary purpose of a Certificate Revocation List (CRL) in a Public Key Infrastructure (PKI)?

A) To list all public keys in the PKI
B) To validate digital certificates
C) To verify the identity of certificate authorities
D) To identify and revoke compromised or invalid certificates

A

Answer: D) To identify and revoke compromised or invalid certificates