pki Flashcards

1
Q
  1. Question: What is the primary function of a digital certificate in PKI?

a) Securely store private keys
b) Verify the authenticity of a public key
c) Encrypt email messages
d) Manage user passwords

A

Answer: b) Verify the authenticity of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Question: In PKI, what is the term for the process of confirming the validity of a certificate before accepting it for use?

a) Certificate issuance
b) Certificate revocation
c) Certificate validation
d) Certificate encryption

A

Answer: c) Certificate validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Question: Which component in PKI is responsible for digitally signing certificates?

a) Registration Authority (RA)
b) Certificate Revocation List (CRL)
c) Certification Authority (CA)
d) Public Key Infrastructure (PKI)

A

Answer: c) Certification Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Question: What is the purpose of the Certificate Revocation List (CRL) in PKI?

a) To list all certificate holders
b) To authenticate users
c) To verify digital signatures
d) To identify revoked certificates

Answer: d) To identify revoked certificates

A

Answer: d) To identify revoked certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Question: Which cryptographic algorithm is commonly used for digital signatures in PKI?

a) RSA
b) DES
c) MD5
d) HMAC

A

Answer: a) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Question: What does a digital signature provide in PKI?

a) Confidentiality
b) Integrity
c) Authentication
d) Availability

A

Answer: b) Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Question: Which protocol is often used for secure email communication in PKI?

a) HTTP
b) SMTP
c) POP3
d) FTP

A

Answer: b) SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Question: In a PKI, what is the purpose of the Public Key?

a) Encrypt messages
b) Verify signatures
c) Decrypt messages
d) Store passwords

A

Answer: b) Verify signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Question: Which key is typically kept secret in a PKI key pair?

a) Public Key
b) Private Key
c) Session Key
d) Master Key

A

Answer: b) Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Question: Which entity is responsible for managing the issuance and revocation of digital certificates in a hierarchical PKI?

*a) End-users
b) Root CA
c) Registration Authority (RA)
d) Web browsers**

A

b) Root CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Question: Which PKI component confirms the identity of certificate applicants?

a) Public Key
b) Registration Authority (RA)
c) Certificate Revocation List (CRL)
d) Encryption Algorithm

A

b) Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Question: Which certificate format is commonly used for securing email communication in PKI?

a) X.509
b) PKCS#7
c) PEM
d) PGP

A

Answer: a) X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Question: What does the term “Chain of Trust” refer to in PKI?

a) A series of CA certificates
b) A secure VPN connection
c) The process of encryption
d) A type of digital signature

A

a) A series of CA certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Question: What is the purpose of the Key Escrow in PKI?

a) To store public keys
b) To recover lost private keys
c) To authenticate users
d) To issue digital certificates

A

b) To recover lost private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Question: Which PKI component verifies the identity of users or entities before issuing a certificate?

a) Certificate Authority (CA)
b) Public Key
c) Registration Authority (RA)
d) Key Management System (KMS)

A

Answer: c) Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Question: Which cryptographic hash function is considered insecure and should be avoided in PKI?

a) SHA-256
b) MD5
c) SHA-1
d) HMAC-SHA-512

A

b) MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Question: In PKI, what is the purpose of the Online Certificate Status Protocol (OCSP)?

a) To encrypt email messages
b) To issue digital certificates
c) To verify the revocation status of a certificate
d) To manage encryption keys

A

c) To verify the revocation status of a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Question: Which type of key is used to establish secure communication in PKI?
    a) Public Key
    b) Private Key
    c) Shared Key
    d) Secret Key
A

a) Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Question: What is the purpose of a Hardware Security Module (HSM) in PKI?
    a) To issue digital certificates
    b) To store private keys securely
    c) To encrypt email messages
    d) To validate digital signatures
A

b) To store private keys securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Question: Which PKI component is responsible for creating and managing digital certificates for users and devices?
    a) Certificate Revocation List (CRL)
    b) Registration Authority (RA)
    c) Certification Authority (CA)
    d) Public Key
A

c) Certification Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Question 21: What is the primary role of the public key in RSA encryption?

A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To generate digital certificates

A

Answer: A) To encrypt data

22
Q

Question 2: According to the book’s content, why is it crucial to select large prime numbers when generating RSA keys?

A) To speed up encryption
B) To ensure reversibility
C) To increase security
D) To reduce modulus size

A

Answer: C) To increase security

23
Q

Question 3: In RSA encryption, what is the term for converting plaintext into ciphertext?

A) Encoding
B) Hashing
C) Decryption
D) Encryption

A

Answer: D) Encryption

24
Q

Question 4: As per the book, what is the primary purpose of digital certificates in PKI (Public Key Infrastructure)?

A) To encrypt data
B) To protect the private key
C) To prove entity identity
D) To generate symmetric keys

A

Answer: C) To prove entity identity

25
Q

Question 5: In RSA encryption, what happens when two ciphered values are multiplied together?

A) They sum up
B) They subtract
C) They divide
D) They multiply

A

Answer: D) They multiply

26
Q

Question 6: According to Fermat’s Little Theorem, what is the result when a number “a” is raised to (p-1) mod p, where “p” is a prime number?

A) 0
B) 1
C) 2
D) p

A

Answer: B) 1

27
Q

Question 7: What role does the exponent “e” play in the encryption key pair of RSA encryption?

A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To prove entity identity

A

Answer: A) To encrypt data

28
Q

Question 8: In the book’s context, what does “commutative encryption” in RSA allow?

A) Secure public network communication
B) Faster encryption and decryption
C) Encryption and decryption in any order
D) Stronger encryption keys

A

Answer: C) Encryption and decryption in any order

29
Q

Question 9: In RSA encryption, what mathematical property enables decryption of two ciphered values to yield the result of their multiplication?

A) Homomorphic encryption
B) Commutative property
C) Associative property
D) Distributive property

A

Answer: A) Homomorphic encryption

30
Q

Question 10: What is the primary objective of RSA encryption’s partially homomorphic cryptosystem, as per the book?

A) To perform operations with plaintext values
B) To enable decryption without keys
C) To allow encryption of messages with varying lengths
D) To perform operations with ciphered values

A

Answer: D) To perform operations with ciphered values

31
Q

Question 11: What is the primary purpose of the private key in RSA encryption?

A) To encrypt data
B) To decrypt data
C) To verify digital signatures
D) To protect the public key

A

Answer: B) To decrypt data

32
Q

Question 12: In RSA encryption, how is the public key typically distributed in a PKI?

A) It is kept secret by the entity
B) It is transmitted over insecure channels
C) It is published in a public directory
D) It is used for symmetric key encryption

A

Answer: C) It is published in a public directory

33
Q

Question 13: What is the term for the process of converting ciphertext back into plaintext in RSA encryption?

A) Decoding
B) Hashing
C) Encryption
D) Decryption

A

Answer: D) Decryption

34
Q

Question 14: In the book’s explanation of RSA encryption, which mathematical concept is fundamental to the algorithm and involves the decomposition of composite numbers into prime factors?

A) Fermat’s Little Theorem
B) Modular arithmetic
C) Factorization
D) Homomorphic encryption

A

Answer: C) Factorization

35
Q

Question 15: According to the book, what property of RSA encryption allows mathematical operations to be performed with ciphered values?

A) Symmetric encryption
B) Homomorphic cryptosystem
C) Digital certificate authentication
D) Prime number generation

A

Answer: B) Homomorphic cryptosystem

36
Q

Question 16: What does the acronym “PKI” stand for in the context of RSA encryption?

A) Public Key Identification
B) Private Key Infrastructure
C) Public Key Infrastructure
D) Prime Key Identifier

A

Answer: C) Public Key Infrastructure

37
Q

Question 17: Based on the book’s content, what is the key length of the example public key mentioned in the text?

A) 256 bits
B) 512 bits
C) 1024 bits
D) 2048 bits

A

Answer: B) 512 bits

38
Q

Question 18: According to the book’s explanation of commutative encryption using RSA, what is the primary purpose of generating two key pairs with shared values?

A) To ensure message integrity
B) To allow decryption in any order
C) To increase encryption speed
D) To strengthen encryption security

A

Answer: B) To allow decryption in any order

39
Q

Question 19: What is the primary function of the modulus (N) in RSA encryption, as mentioned in the book?

A) To ensure data integrity
B) To generate digital certificates
C) To protect the private key
D) To facilitate mathematical operations

A

Answer: D) To facilitate mathematical operations

40
Q

Question 20: According to the book’s content, which component of RSA encryption is used to protect the symmetric key in scenarios like disk encryption?

A) Public key
B) Modulus (N)
C) Exponent (e)
D) Private key

A

Answer: A) Public key

41
Q

Question 21: In RSA encryption, what is the term used for converting plaintext into ciphertext?

A) Encoding
B) Hashing
C) Decryption
D) Encryption

A

Answer: D) Encryption

42
Q

Question 22: In RSA encryption, what is the result of multiplying two ciphered values?

A) The sum of the two values
B) The subtraction of the two values
C) The division of the two values
D) The product of the two values

A

Answer: D) The product of the two values

43
Q

Question 23: In RSA encryption, what is the primary role of the public key?

A) To decrypt data
B) To protect the private key
C) To generate digital signatures
D) To encrypt data

A

Answer: D) To encrypt data

44
Q

Question 24: As mentioned in the book’s content, what is the significance of selecting large prime numbers when generating RSA keys?

A) It speeds up the encryption process
B) It ensures that encryption is reversible
C) It increases the security of the key pair
D) It reduces the size of the modulus

A

Answer: C) It increases the security of the key pair

45
Q

Question 25: In RSA encryption, what is the term used for the process of converting plaintext into ciphertext?

A) Encoding
B) Hashing
C) Decryption
D) Encryption

A

Answer: D) Encryption

46
Q

Question 26: As mentioned in the book’s content, what is the primary purpose of digital certificates in the context of public key infrastructure (PKI)?

A) To encrypt data
B) To protect the private key
C) To prove the identity of entities
D) To generate symmetric keys

A

Answer: C) To prove the identity of entities

47
Q

Question 27: In RSA encryption, what is the result of multiplying two ciphered values?

A) The sum of the two values
B) The subtraction of the two values
C) The division of the two values
D) The product of the two values

A

Answer: D) The product of the two values

48
Q

Question 28: According to Fermat’s Little Theorem, what should the result be when a number “a” is raised to the power of (p-1) mod p, where “p” is a prime number?

A) 0
B) 1
C) 2
D) p

A

Answer: B) 1

49
Q

uestion 29: In RSA encryption, what is the primary role of the exponent “e” in the encryption key pair?

A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To prove the identity of entities

A

Answer: A) To encrypt data

50
Q

Question 30: According to the book’s content, what does commutative encryption in RSA allow for?

A) Secure communication over public networks
B) Faster encryption and decryption
C) Encryption and decryption in any order
D) Stronger encryption keys

A

Answer: C) Encryption and decryption in any order