Cryptography and PKI Flashcards

1
Q
What type of certificate can be used for a list of explicitly given domains, IP addresses or sub domains?
A. Code signed
B. Wildcard
C. Self signed
D. SAN
A

D. SAN

Subject Alternative Name certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following options is a protocol used to check if a certificate has been revoked?
A. PKI
B. CSR
C. OCSP
D. MD5
A

C. OCSP

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Out of the following algorithms, which is a symmetric-key algorithm?
A. RSA
B. PGP/GPG
C. DSA
D. DES
A

D. DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term best describes the following statement:
Plain text data is converted to an unreadable format that cannot be converted back into it’s original format?
A. Encryption
B. Hashing
C. Code book
D. A symmetric encryption

A

B. Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A junior security professional on your team is trying to export a public certification and share it with a colleague outside of the IT department. they ask you if they should use a CER or PFX format. Which format should be used?
A. CER
B. PFX
C. Both are acceptable
D. Neither are acceptable
A

A. CER

CER doesn’t share private key. PFX does, and should never be shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What type of public certificate can be used with multiple sub-domains?
A. Multipurpose
B. Domain validated certificate
C. Wildcard
D. Self-signed
A

C. Wildcard

Wildcard domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A string of text is converted to a numeric value that uniquely identifies the original text. With only the numeric value it is impossible to reproduce the original text value. Which term correctly identifies this numeric value?
A. Plain value
B. Encrypted value
C. Cipher value
D. Hash value
A

D. Hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
How many rounds does 3DES perform when encrypting data?
A. 8
B. 16
C. 32
D. 48
A

D. 48

3DES = 3x16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What is the name of the process used to digitally sign executable?
A. Executable Signature Signing
B. Code signing
C. Code pinning
D. Code validation signature
A

B. Code signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
James is sending and email to Bob. To ensure confidentially James needs to send the email in an encrypted format using PKI. What will James use to encrypt the email so Bob can decrypt it?
A. Bob's public key
B. Bob's private key
C. James' public key
D. James' private key
A

A. Bob’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly