pki Flashcards
- Question: What is the primary function of a digital certificate in PKI?
a) Securely store private keys
b) Verify the authenticity of a public key
c) Encrypt email messages
d) Manage user passwords
Answer: b) Verify the authenticity of a public key
- Question: In PKI, what is the term for the process of confirming the validity of a certificate before accepting it for use?
a) Certificate issuance
b) Certificate revocation
c) Certificate validation
d) Certificate encryption
Answer: c) Certificate validation
- Question: Which component in PKI is responsible for digitally signing certificates?
a) Registration Authority (RA)
b) Certificate Revocation List (CRL)
c) Certification Authority (CA)
d) Public Key Infrastructure (PKI)
Answer: c) Certification Authority (CA)
- Question: What is the purpose of the Certificate Revocation List (CRL) in PKI?
a) To list all certificate holders
b) To authenticate users
c) To verify digital signatures
d) To identify revoked certificates
Answer: d) To identify revoked certificates
Answer: d) To identify revoked certificates
- Question: Which cryptographic algorithm is commonly used for digital signatures in PKI?
a) RSA
b) DES
c) MD5
d) HMAC
Answer: a) RSA
- Question: What does a digital signature provide in PKI?
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
Answer: b) Integrity
- Question: Which protocol is often used for secure email communication in PKI?
a) HTTP
b) SMTP
c) POP3
d) FTP
Answer: b) SMTP
- Question: In a PKI, what is the purpose of the Public Key?
a) Encrypt messages
b) Verify signatures
c) Decrypt messages
d) Store passwords
Answer: b) Verify signatures
- Question: Which key is typically kept secret in a PKI key pair?
a) Public Key
b) Private Key
c) Session Key
d) Master Key
Answer: b) Private Key
- Question: Which entity is responsible for managing the issuance and revocation of digital certificates in a hierarchical PKI?
*a) End-users
b) Root CA
c) Registration Authority (RA)
d) Web browsers**
b) Root CA
- Question: Which PKI component confirms the identity of certificate applicants?
a) Public Key
b) Registration Authority (RA)
c) Certificate Revocation List (CRL)
d) Encryption Algorithm
b) Registration Authority (RA)
- Question: Which certificate format is commonly used for securing email communication in PKI?
a) X.509
b) PKCS#7
c) PEM
d) PGP
Answer: a) X.509
- Question: What does the term “Chain of Trust” refer to in PKI?
a) A series of CA certificates
b) A secure VPN connection
c) The process of encryption
d) A type of digital signature
a) A series of CA certificates
- Question: What is the purpose of the Key Escrow in PKI?
a) To store public keys
b) To recover lost private keys
c) To authenticate users
d) To issue digital certificates
b) To recover lost private keys
- Question: Which PKI component verifies the identity of users or entities before issuing a certificate?
a) Certificate Authority (CA)
b) Public Key
c) Registration Authority (RA)
d) Key Management System (KMS)
Answer: c) Registration Authority (RA)
- Question: Which cryptographic hash function is considered insecure and should be avoided in PKI?
a) SHA-256
b) MD5
c) SHA-1
d) HMAC-SHA-512
b) MD5
- Question: In PKI, what is the purpose of the Online Certificate Status Protocol (OCSP)?
a) To encrypt email messages
b) To issue digital certificates
c) To verify the revocation status of a certificate
d) To manage encryption keys
c) To verify the revocation status of a certificate
- Question: Which type of key is used to establish secure communication in PKI?
a) Public Key
b) Private Key
c) Shared Key
d) Secret Key
a) Public Key
- Question: What is the purpose of a Hardware Security Module (HSM) in PKI?
a) To issue digital certificates
b) To store private keys securely
c) To encrypt email messages
d) To validate digital signatures
b) To store private keys securely
- Question: Which PKI component is responsible for creating and managing digital certificates for users and devices?
a) Certificate Revocation List (CRL)
b) Registration Authority (RA)
c) Certification Authority (CA)
d) Public Key
c) Certification Authority (CA)
Question 21: What is the primary role of the public key in RSA encryption?
A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To generate digital certificates
Answer: A) To encrypt data
Question 2: According to the book’s content, why is it crucial to select large prime numbers when generating RSA keys?
A) To speed up encryption
B) To ensure reversibility
C) To increase security
D) To reduce modulus size
Answer: C) To increase security
Question 3: In RSA encryption, what is the term for converting plaintext into ciphertext?
A) Encoding
B) Hashing
C) Decryption
D) Encryption
Answer: D) Encryption
Question 4: As per the book, what is the primary purpose of digital certificates in PKI (Public Key Infrastructure)?
A) To encrypt data
B) To protect the private key
C) To prove entity identity
D) To generate symmetric keys
Answer: C) To prove entity identity
Question 5: In RSA encryption, what happens when two ciphered values are multiplied together?
A) They sum up
B) They subtract
C) They divide
D) They multiply
Answer: D) They multiply
Question 6: According to Fermat’s Little Theorem, what is the result when a number “a” is raised to (p-1) mod p, where “p” is a prime number?
A) 0
B) 1
C) 2
D) p
Answer: B) 1
Question 7: What role does the exponent “e” play in the encryption key pair of RSA encryption?
A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To prove entity identity
Answer: A) To encrypt data
Question 8: In the book’s context, what does “commutative encryption” in RSA allow?
A) Secure public network communication
B) Faster encryption and decryption
C) Encryption and decryption in any order
D) Stronger encryption keys
Answer: C) Encryption and decryption in any order
Question 9: In RSA encryption, what mathematical property enables decryption of two ciphered values to yield the result of their multiplication?
A) Homomorphic encryption
B) Commutative property
C) Associative property
D) Distributive property
Answer: A) Homomorphic encryption
Question 10: What is the primary objective of RSA encryption’s partially homomorphic cryptosystem, as per the book?
A) To perform operations with plaintext values
B) To enable decryption without keys
C) To allow encryption of messages with varying lengths
D) To perform operations with ciphered values
Answer: D) To perform operations with ciphered values
Question 11: What is the primary purpose of the private key in RSA encryption?
A) To encrypt data
B) To decrypt data
C) To verify digital signatures
D) To protect the public key
Answer: B) To decrypt data
Question 12: In RSA encryption, how is the public key typically distributed in a PKI?
A) It is kept secret by the entity
B) It is transmitted over insecure channels
C) It is published in a public directory
D) It is used for symmetric key encryption
Answer: C) It is published in a public directory
Question 13: What is the term for the process of converting ciphertext back into plaintext in RSA encryption?
A) Decoding
B) Hashing
C) Encryption
D) Decryption
Answer: D) Decryption
Question 14: In the book’s explanation of RSA encryption, which mathematical concept is fundamental to the algorithm and involves the decomposition of composite numbers into prime factors?
A) Fermat’s Little Theorem
B) Modular arithmetic
C) Factorization
D) Homomorphic encryption
Answer: C) Factorization
Question 15: According to the book, what property of RSA encryption allows mathematical operations to be performed with ciphered values?
A) Symmetric encryption
B) Homomorphic cryptosystem
C) Digital certificate authentication
D) Prime number generation
Answer: B) Homomorphic cryptosystem
Question 16: What does the acronym “PKI” stand for in the context of RSA encryption?
A) Public Key Identification
B) Private Key Infrastructure
C) Public Key Infrastructure
D) Prime Key Identifier
Answer: C) Public Key Infrastructure
Question 17: Based on the book’s content, what is the key length of the example public key mentioned in the text?
A) 256 bits
B) 512 bits
C) 1024 bits
D) 2048 bits
Answer: B) 512 bits
Question 18: According to the book’s explanation of commutative encryption using RSA, what is the primary purpose of generating two key pairs with shared values?
A) To ensure message integrity
B) To allow decryption in any order
C) To increase encryption speed
D) To strengthen encryption security
Answer: B) To allow decryption in any order
Question 19: What is the primary function of the modulus (N) in RSA encryption, as mentioned in the book?
A) To ensure data integrity
B) To generate digital certificates
C) To protect the private key
D) To facilitate mathematical operations
Answer: D) To facilitate mathematical operations
Question 20: According to the book’s content, which component of RSA encryption is used to protect the symmetric key in scenarios like disk encryption?
A) Public key
B) Modulus (N)
C) Exponent (e)
D) Private key
Answer: A) Public key
Question 21: In RSA encryption, what is the term used for converting plaintext into ciphertext?
A) Encoding
B) Hashing
C) Decryption
D) Encryption
Answer: D) Encryption
Question 22: In RSA encryption, what is the result of multiplying two ciphered values?
A) The sum of the two values
B) The subtraction of the two values
C) The division of the two values
D) The product of the two values
Answer: D) The product of the two values
Question 23: In RSA encryption, what is the primary role of the public key?
A) To decrypt data
B) To protect the private key
C) To generate digital signatures
D) To encrypt data
Answer: D) To encrypt data
Question 24: As mentioned in the book’s content, what is the significance of selecting large prime numbers when generating RSA keys?
A) It speeds up the encryption process
B) It ensures that encryption is reversible
C) It increases the security of the key pair
D) It reduces the size of the modulus
Answer: C) It increases the security of the key pair
Question 25: In RSA encryption, what is the term used for the process of converting plaintext into ciphertext?
A) Encoding
B) Hashing
C) Decryption
D) Encryption
Answer: D) Encryption
Question 26: As mentioned in the book’s content, what is the primary purpose of digital certificates in the context of public key infrastructure (PKI)?
A) To encrypt data
B) To protect the private key
C) To prove the identity of entities
D) To generate symmetric keys
Answer: C) To prove the identity of entities
Question 27: In RSA encryption, what is the result of multiplying two ciphered values?
A) The sum of the two values
B) The subtraction of the two values
C) The division of the two values
D) The product of the two values
Answer: D) The product of the two values
Question 28: According to Fermat’s Little Theorem, what should the result be when a number “a” is raised to the power of (p-1) mod p, where “p” is a prime number?
A) 0
B) 1
C) 2
D) p
Answer: B) 1
uestion 29: In RSA encryption, what is the primary role of the exponent “e” in the encryption key pair?
A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To prove the identity of entities
Answer: A) To encrypt data
Question 30: According to the book’s content, what does commutative encryption in RSA allow for?
A) Secure communication over public networks
B) Faster encryption and decryption
C) Encryption and decryption in any order
D) Stronger encryption keys
Answer: C) Encryption and decryption in any order