Information Technology Reference
In-Depth Information
2. Which of the following is used in both ends of the cryptography process (encrypt and
decrypt) and must be known by both parties?
a. Public key
b. Private key
c. Secret key
d. Digital signature
3. A PKI is based on symmetric cryptography. True or False?
4. If you want the most security, which of the following should you use?
a. Symmetric cryptography only
b. Asymmetric cryptography only
c. A combination of symmetric and asymmetric cryptography
d. Secret key cryptography
5. Camille and Sophie want to engage in secure communication. Both hold a public/private key
pair. Camille wants to send an encrypted message to Sophie. Which of the following hap-
pens first?
a. Camille encrypts the message with her public key.
b. Camille sends Sophie her private key.
c. Sophie sends Camille her public key.
d. Camille encrypts the message with her private key.
6. You have installed your root CA and will be taking it offline. The root CA must be a(n)
______________ CA.
7. In a three-level CA hierarchy, the middle-level servers are referred to as ______________ CAs.
8. Which of the following identifies the CA and describes the CA's certificate renewal policy?
a. Root CA
b. Online responder
c. CRL
d. CPS
9. You're installing AD CS in your network. You need a secure environment and want to
require the CA administrator to enter a password each time the CA performs cryptographic
operations. Which option should you enable during installation?
a. Select the hash algorithm for signing certificates issued by this CA.
b. Select a cryptographic service provider (CSP).
c. Use strong private key protection features provided by the CSP.
d. Change the key length.
10. Version 1 templates can't be modified, but they can be duplicated and then modified. True
or False?
11. A certificate is issued on July 1, 2009. Its validity period is 2 years, and its renewal period
is 2 months. When can the certificate first be renewed?
a.
September 1, 2009
b.
May 1, 2011
c.
September 1, 2011
d.
May 1, 2010
Search WWH ::




Custom Search