What Is Certificate In Network Security?

26 Questions | Total Attempts: 52

SettingsSettingsSettings
Please wait...
Network Quizzes & Trivia

This is a quiz for all the computer lovers out there. If you want to test your knowledge on this particular bunch of random IT facts take this quiz and find out how vast your knowledge is.


Questions and Answers
  • 1. 
    Digital signatures actually only show that the public key labeled as belonging to person was used to encrypt the digital signature.
    • A. 

      True

    • B. 

      False

  • 2. 
    Digital certificates cannot be used to identify objects other than users.
    • A. 

      True

    • B. 

      False

  • 3. 
    Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.
    • A. 

      True

    • B. 

      False

  • 4. 
    Cryptography cannot protect data as it is being transported across a network.
    • A. 

      True

    • B. 

      False

  • 5. 
    Security tools function at the same layer of the Open System Interconnection (OSI) model.
    • A. 

      True

    • B. 

      FALSE

  • 6. 
    Can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.
    • A. 

      Blocking

    • B. 

      Hashing

    • C. 

      Encrypting

    • D. 

      Encrypting

  • 7. 
    Can protect the confidentiality of an e-mail message by ensuring that no one has read it.
    • A. 

      Public encryption

    • B. 

      Standard encryption

    • C. 

      Asymmetric encryption

    • D. 

      Symmetric encryption

  • 8. 
    Can verify the authenticity of the sender and enforce nonrepudiation to prove that the sender is who he claims to be and cannot deny sending it.
    • A. 

      Symmetric encryption

    • B. 

      Private encryption

    • C. 

      Asymmetric encryption

    • D. 

      Elliptic encryption

  • 9. 
    A(n) ____ serves as the trusted third-party agency that is responsible for issuing the digital certificates.
    • A. 

      RA

    • B. 

      DA

    • C. 

      CA

    • D. 

      PA

  • 10. 
    The ____ function is a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
    • A. 

      Registration Authority

    • B. 

      Certificate Authority

    • C. 

      Repudiation Authority

    • D. 

      Intermediate Authority

  • 11. 
    The primary function of a(n) ____ is to verify the identity of the individual.
    • A. 

      RA

    • B. 

      CA

    • C. 

      DA

    • D. 

      PA

  • 12. 
    Certificates are frequently used to secure e-mail transmissions and typically only require the user’s name and e-mail address in order to receive this certificate.
    • A. 

      Private digital

    • B. 

      Personal digital

    • C. 

      Public digital

    • D. 

      Server digital

  • 13. 
     certificates enable clients connecting to the Web server to examine the identity of the server’s owner.
    • A. 

      Personal digital

    • B. 

      Public digital

    • C. 

      Private digital

    • D. 

      Server digital

  • 14. 
    A class 2 certificate is known as a ____ certificate.
    • A. 

      Signing digital

    • B. 

      Server digital

    • C. 

      Personal digital

    • D. 

      Code-signing

  • 15. 
    Involves public-key cryptography standards, trust models, and key management.
    • A. 

      Public key infrastructure

    • B. 

      Network key infrastructure

    • C. 

      Private key infrstructure

    • D. 

      Shared key infrastructure

  • 16. 
    A ____ trust refers to a situation in which two individuals trust each other because each trusts a third party.
    • A. 

      Web of web of

    • B. 

      Mutual

    • C. 

      Third-party

    • D. 

      Distributed

  • 17. 
    The ____ model is the basis for digital certificates issued to Internet users.
    • A. 

      Third-party trust

    • B. 

      Related trust

    • C. 

      Managed trust

    • D. 

      Distributed trust

  • 18. 
    With the ____ model, there is one CA that acts as a “facilitator” to interconnect all other CAs.
    • A. 

      Bridge trust

    • B. 

      Distributed trust

    • C. 

      Third-party trust

    • D. 

      Transitive trust

  • 19. 
    The ____ provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components.
    • A. 

      DP

    • B. 

      CP

    • C. 

      LP

    • D. 

      AP

  • 20. 
    At the ____ stage of the certificate life cycle, the certificate can no longer be used.
    • A. 

      Creation

    • B. 

      Suspension

    • C. 

      Revocation

    • D. 

      Expiration

  • 21. 
    At the ____ stage of the certificate life cycle, the certificate is no longer valid.
    • A. 

      Creation

    • B. 

      Suspension

    • C. 

      Revocation

    • D. 

      Expiration

  • 22. 
    Key ____ refers to a process in which keys are managed by a third party, such as a trusted CA.
    • A. 

      Escrow

    • B. 

      Destruction

    • C. 

      Renewal

    • D. 

      Management

  • 23. 
    Key ____ removes all private and public keys along with the user’s identification information in the CA.
    • A. 

      Renewal

    • B. 

      Escrow

    • C. 

      Generation

    • D. 

      Destruction

  • 24. 
     is a protocol developed by Netscape for securely transmitting documents over the Internet.
    • A. 

      SSL

    • B. 

      TLS

    • C. 

      PEAP

    • D. 

      EAP

  • 25. 
    TLS is an extension of ____.
    • A. 

      Telnet

    • B. 

      HTTP

    • C. 

      SSL

    • D. 

      FTP

Back to Top Back to top