Cryptography and PKI Flashcards
1
Q
What type of certificate can be used for a list of explicitly given domains, IP addresses or sub domains? A. Code signed B. Wildcard C. Self signed D. SAN
A
D. SAN
Subject Alternative Name certificates
2
Q
Which of the following options is a protocol used to check if a certificate has been revoked? A. PKI B. CSR C. OCSP D. MD5
A
C. OCSP
Online Certificate Status Protocol
3
Q
Out of the following algorithms, which is a symmetric-key algorithm? A. RSA B. PGP/GPG C. DSA D. DES
A
D. DES
4
Q
Which term best describes the following statement:
Plain text data is converted to an unreadable format that cannot be converted back into it’s original format?
A. Encryption
B. Hashing
C. Code book
D. A symmetric encryption
A
B. Hashing
5
Q
A junior security professional on your team is trying to export a public certification and share it with a colleague outside of the IT department. they ask you if they should use a CER or PFX format. Which format should be used? A. CER B. PFX C. Both are acceptable D. Neither are acceptable
A
A. CER
CER doesn’t share private key. PFX does, and should never be shared.
6
Q
What type of public certificate can be used with multiple sub-domains? A. Multipurpose B. Domain validated certificate C. Wildcard D. Self-signed
A
C. Wildcard
Wildcard domain
7
Q
A string of text is converted to a numeric value that uniquely identifies the original text. With only the numeric value it is impossible to reproduce the original text value. Which term correctly identifies this numeric value? A. Plain value B. Encrypted value C. Cipher value D. Hash value
A
D. Hash value
8
Q
How many rounds does 3DES perform when encrypting data? A. 8 B. 16 C. 32 D. 48
A
D. 48
3DES = 3x16
9
Q
What is the name of the process used to digitally sign executable? A. Executable Signature Signing B. Code signing C. Code pinning D. Code validation signature
A
B. Code signing
10
Q
James is sending and email to Bob. To ensure confidentially James needs to send the email in an encrypted format using PKI. What will James use to encrypt the email so Bob can decrypt it? A. Bob's public key B. Bob's private key C. James' public key D. James' private key
A
A. Bob’s public key