Study Chapter 13 Network Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. What electronic piece of information proves the identity of the entity that has signed a particular document?

Explanation

A digital signature is a cryptographic technique used to verify the authenticity of a digital message or document. It proves the identity of the entity that has signed the document. Certificate Authority issues certificates, public key is used for encryption, and private key is used for decryption, but they do not directly prove the identity of the signer.

Submit
Please wait...
About This Quiz
Network Fundamentals Quizzes & Trivia

Explore the essentials of network fundamentals with this interactive flashcard set. Covering key definitions and concepts from Chapter 13, this tool enhances understanding and revision of network principles,... see morecrucial for students and professionals in IT and computer science. see less

2. Users with what predefined security role are tasked with issuing and managing certificates, including approving certificate enrollment and revocation requests?

Explanation

Certificate Managers have the specific role and responsibility of managing certificates, including approving requests for certificate enrollment and revocation. Therefore, the correct answer is Certificate Manager.

Submit
3. The Network Device Enrollment Service (NDES) enables network devices to enroll for certificates within a Windows Server 2008 PKI using the Certificates MMC snap-in. TRUE OR FALSE.

Explanation

The correct answer is FALSE because the Network Device Enrollment Service (NDES) does not allow network devices to enroll for certificates using the Certificates MMC snap-in. This process typically involves using the NDES server role within the Windows Server environment.

Submit
4. What identifies certificates that have been revoked or terminated?

Explanation

A Certificate Revocation List (CRL) is a list of certificates that have been revoked or terminated by the issuing Certificate Authority.

Submit
5. Which of the following are not able to be performed by those with the Auditor predefined security role?

Explanation

The Auditor predefined security role does not have the ability to define key recovery agents, but can perform the other listed tasks.

Submit
6. Certificate templates are used by a Certificate Authority to simplify the administration and issuance of digital certificates. TRUE OR FALSE?

Explanation

Certificate templates play a crucial role in the efficient management and issuance of digital certificates by providing a pre-defined structure for various certificate types.

Submit
7. What consists of a number of elements that allow two parties to communicate securely, without any previous communication, through the use of a mathematical algorithm called public key cryptography?
Submit
8. What type of CA can use certificate templates as well as Group Policy Objects to allow autoenrollment of digital certificates, as well as store digital certificates within the Active Directory database for easy retrieval by users and devices?

Explanation

Enterprise CAs are able to use certificate templates and Group Policy Objects for autoenrollment and storing digital certificates in Active Directory, making them the correct answer.

Submit
9. Can CAs exist in a hierarchical structure consisting of a subordinate CA and one or more root CAs beneath the root?

Explanation

Certificate Authorities (CAs) do not exist in a hierarchical structure where root CAs have subordinate CAs beneath them.

Submit
10. What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?

Explanation

Smart cards are commonly used to securely store digital certificates and are portable and convenient for users to carry around. RSA SecureID is a form of two-factor authentication but not necessarily a small physical device for storing digital certificates. USB drives and RFID chips are not specifically designed to store digital certificates in the same way that smart cards are.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What electronic piece of information proves the identity of the entity...
Users with what predefined security role are tasked with issuing and...
The Network Device Enrollment Service (NDES) enables network devices...
What identifies certificates that have been revoked or terminated?
Which of the following are not able to be performed by those with the...
Certificate templates are used by a Certificate Authority to simplify...
What consists of a number of elements that allow two parties to...
What type of CA can use certificate templates as well as Group Policy...
Can CAs exist in a hierarchical structure consisting of a subordinate...
What are small physical devices on which a digital certificate is...
Alert!

Advertisement