How Much Do You Know About Digital Certificate? Chapter 12 Quiz

15 Questions | Total Attempts: 527

SettingsSettingsSettings
Please wait...
How Much Do You Know About Digital Certificate? Chapter 12 Quiz

A digital certificate is used to verify that a user sending a message is who they claim to be and to provide the receiver with the means to encode a reply. This makes it possible to trace people who commit the cyber-crimes and other electrical threats. How much do you know about digital certificate from covering chapter 12? Take up the test below and get to find out for yourself.


Questions and Answers
  • 1. 
    Can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it
    • A. 

      Cloning

    • B. 

      Blocking

    • C. 

      Hashing

    • D. 

      Encrypting

  • 2. 
    Digital signatures actually only show that the public key labeled as belonging to person was used to encrypt the digital signature.
    • A. 

      False

    • B. 

      True

  • 3. 
    At the ____ stage of the certificate life cycle, the certificate is no longer valid.
    • A. 

      Expiration

    • B. 

      Revocation

    • C. 

      Creation

    • D. 

      Suspension

  • 4. 
     involves public-key cryptography standards, trust models, and key management.
    • A. 

      Shared key infrastructure

    • B. 

      Public key infrastructure

    • C. 

      Network key infrastructure

    • D. 

      Private key infrastructure

  • 5. 
    The ____ provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components.
    • A. 

      CP

    • B. 

      LP

    • C. 

      DP

    • D. 

      AP

  • 6. 
    A(n) ____ serves as the trusted third-party agency that is responsible for issuing the digital certificates.
    • A. 

      PA

    • B. 

      CA

    • C. 

      DA

    • D. 

      RA

  • 7. 
    The ____ model is the basis for digital certificates issued to Internet users.
    • A. 

      Managed trust

    • B. 

      Third-party trust

    • C. 

      Distributed trust

    • D. 

      Related trust

  • 8. 
     is a protocol developed by Netscape for securely transmitting documents over the Internet.
    • A. 

      SSL

    • B. 

      EAP

    • C. 

      TLS

    • D. 

      PEAP

  • 9. 
    A class 2 certificate is known as a ____ certificate.
    • A. 

      Personal digital

    • B. 

      Signing digital

    • C. 

      Server digital

    • D. 

      Code-signing

  • 10. 
    Digital certificates cannot be used to identify objects other than users.
    • A. 

      True

    • B. 

      False

  • 11. 
    Cryptography cannot protect data as it is being transported across a network.
    • A. 

      True

    • B. 

      False

  • 12. 
    Key ____ removes all private and public keys along with the user’s identification information in the CA.
    • A. 

      Renewal

    • B. 

      Escrow

    • C. 

      Generation

    • D. 

      Destruction

  • 13. 
    Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.
    • A. 

      False

    • B. 

      True

  • 14. 
    TLS is an extension of ____.
    • A. 

      HTTP

    • B. 

      SSL

    • C. 

      Telnet

    • D. 

      FTP

  • 15. 
    Key ____ refers to a process in which keys are managed by a third party, such as a trusted CA.
    • A. 

      Management

    • B. 

      Destruction

    • C. 

      Escrow

    • D. 

      Renewal

Back to Top Back to top