1.
Digital signatures actually only show that the public key labeled as belonging to person was used to encrypt the digital signature.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that digital signatures are used to verify the authenticity and integrity of digital documents. When a digital signature is created, it is encrypted using the private key of the signer. The encrypted signature can then be decrypted using the corresponding public key, which verifies that the signature was indeed created by the person associated with that public key. Therefore, digital signatures only prove that the public key labeled as belonging to a person was used to encrypt the signature, confirming its authenticity.
2.
Digital certificates cannot be used to identify objects other than users.
Correct Answer
B. False
Explanation
Digital certificates can be used to identify not only users but also other objects such as servers, devices, and software applications. Digital certificates are used to establish trust and verify the identity of the entity to which the certificate is issued. This can be done for various purposes, including secure communication, authentication, and data integrity. Therefore, the statement that digital certificates cannot be used to identify objects other than users is false.
3.
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.
Correct Answer
A. True
Explanation
Public keys are used for encryption and verifying digital signatures, while private keys are used for decryption and creating digital signatures. Storing public keys within digital certificates allows for easy distribution and verification of the public key's authenticity. On the other hand, private keys need to be kept secure and are typically stored locally on the user's system to prevent unauthorized access. Therefore, the statement that public keys can be stored in digital certificates while private keys can be stored on the user's local system is true.
4.
Cryptography cannot protect data as it is being transported across a network.
Correct Answer
B. False
Explanation
Cryptography plays a crucial role in protecting data during its transportation across a network. It involves the use of encryption techniques to convert the data into an unreadable format, ensuring that only authorized parties can access and understand the information. This helps in preventing unauthorized access, eavesdropping, and tampering of data while it is in transit. Therefore, the statement that cryptography cannot protect data during transportation across a network is false.
5.
Security tools function at the same layer of the Open System Interconnection (OSI) model.
Correct Answer
B. FALSE
Explanation
Security tools do not necessarily function at the same layer of the OSI model. The OSI model is a conceptual framework that describes how different network protocols and technologies interact. Security tools can operate at various layers of the OSI model depending on their functionality. For example, firewalls typically operate at the network layer (Layer 3), while encryption and authentication protocols may operate at the presentation layer (Layer 6) or application layer (Layer 7). Therefore, the statement that security tools function at the same layer of the OSI model is false.
6.
Can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.
Correct Answer
B. Hashing
Explanation
Hashing can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it. Hashing involves applying a mathematical algorithm to the file, which generates a unique hash value. If even a small change is made to the file, the hash value will be completely different. By comparing the original hash value with the recalculated hash value, it is possible to determine if the file has been altered. Therefore, hashing is an effective method to verify the integrity of a file and detect any unauthorized modifications.
7.
Can protect the confidentiality of an e-mail message by ensuring that no one has read it.
Correct Answer
D. Symmetric encryption
Explanation
Symmetric encryption can protect the confidentiality of an e-mail message by ensuring that no one has read it. In symmetric encryption, the same key is used for both encryption and decryption. This means that the sender and the recipient share the same key, which they can use to encrypt and decrypt the message. As long as the key remains secret, only the intended recipient will be able to decrypt and read the message. This ensures that no one else can access the message and maintain its confidentiality.
8.
Can verify the authenticity of the sender and enforce nonrepudiation to prove that the sender is who he claims to be and cannot deny sending it.
Correct Answer
C. Asymmetric encryption
Explanation
Asymmetric encryption can verify the authenticity of the sender and enforce nonrepudiation. This is because asymmetric encryption uses a pair of keys, a public key and a private key. The sender uses their private key to encrypt the message, and the recipient uses the sender's public key to decrypt the message. This ensures that only the sender, who possesses the private key, could have encrypted the message. Asymmetric encryption also allows for digital signatures, which can be used to prove the identity of the sender and prevent them from denying sending the message.
9.
A(n) ____ serves as the trusted third-party agency that is responsible for issuing the digital certificates.
Correct Answer
C. CA
Explanation
A Certificate Authority (CA) is an organization that is responsible for issuing digital certificates. These digital certificates verify the authenticity and integrity of digital information, such as websites or electronic documents. CAs play a crucial role in ensuring secure communication and transactions online by acting as a trusted third-party agency that verifies the identity of individuals or entities and issues the necessary certificates.
10.
The ____ function is a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
Correct Answer
A. Registration Authority
Explanation
The Registration Authority function is a subordinate entity designed to handle specific Certificate Authority tasks such as processing certificate requests and authenticating users. The Registration Authority is responsible for verifying the identity of users and ensuring that the requested certificates are valid and issued correctly. It acts as an intermediary between the user and the Certificate Authority, facilitating the process of obtaining certificates and managing user authentication.
11.
The primary function of a(n) ____ is to verify the identity of the individual.
Correct Answer
A. RA
Explanation
A Registration Authority (RA) is responsible for verifying the identity of an individual. It acts as an intermediary between the individual and the Certification Authority (CA) to validate the identity credentials provided by the individual. The RA ensures that the individual's identity information is accurate and authentic before issuing a digital certificate. The RA plays a crucial role in maintaining the integrity and security of the digital certificate issuance process.
12.
Certificates are frequently used to secure e-mail transmissions and typically only require the user’s name and e-mail address in order to receive this certificate.
Correct Answer
B. Personal digital
Explanation
Personal digital certificates are frequently used to secure e-mail transmissions. These certificates typically only require the user's name and e-mail address to receive them. This means that the certificate is personalized to the individual user and is used to verify their identity when sending secure e-mails.
13.
certificates enable clients connecting to the Web server to examine the identity of the server’s owner.
Correct Answer
D. Server digital
Explanation
Server digital certificates enable clients connecting to the Web server to examine the identity of the server's owner. These certificates are used to authenticate the server and establish a secure connection between the client and the server. The server's digital certificate contains information such as the server's public key, the server's domain name, and the digital signature of a trusted certificate authority. This allows clients to verify that they are communicating with the legitimate server and not an imposter.
14.
A class 2 certificate is known as a ____ certificate.
Correct Answer
B. Server digital
Explanation
A class 2 certificate is known as a server digital certificate because it is primarily used for server authentication. This type of certificate verifies the identity of a server and ensures secure communication between the server and the client. It is commonly used in web servers, email servers, and other network services where server authentication is essential for establishing trust and protecting sensitive information.
15.
Involves public-key cryptography standards, trust models, and key management.
Correct Answer
A. Public key infrastructure
Explanation
Public key infrastructure (PKI) is a system that involves public-key cryptography standards, trust models, and key management. It is used to secure communication and transactions over networks by providing a framework for managing digital certificates and encryption keys. PKI ensures the authenticity, integrity, and confidentiality of data transmitted over the network. It uses a public key to encrypt data and a private key to decrypt it, ensuring secure communication between parties. PKI is widely used in various applications, including secure email, SSL/TLS for secure web browsing, and secure electronic transactions.
16.
A ____ trust refers to a situation in which two individuals trust each other because each trusts a third party.
Correct Answer
C. Third-party
Explanation
A third-party trust refers to a situation in which two individuals trust each other because each trusts a third party. In this scenario, the trust between the two individuals is established based on their shared trust in a common third party. This third party acts as a mediator or intermediary, ensuring the trustworthiness and reliability of the individuals involved. The concept of a third-party trust helps to create a network or web of trust, where multiple relationships are interconnected and rely on the trustworthiness of a central authority.
17.
The ____ model is the basis for digital certificates issued to Internet users.
Correct Answer
D. Distributed trust
Explanation
The distributed trust model is the basis for digital certificates issued to Internet users. In this model, trust is not placed in a single central authority or third-party, but rather distributed across multiple entities. This ensures that no single entity has complete control over the trust process, enhancing security and reducing the risk of compromise. Digital certificates issued under this model rely on a network of trusted entities to verify and validate the identity of Internet users.
18.
With the ____ model, there is one CA that acts as a “facilitator” to interconnect all other CAs.
Correct Answer
A. Bridge trust
Explanation
In the bridge trust model, there is one Certification Authority (CA) that acts as a "facilitator" to interconnect all other CAs. This means that the bridge CA is responsible for establishing and maintaining trust relationships between different CAs, allowing them to securely communicate and exchange information. This model is often used in complex systems where multiple CAs need to collaborate and trust each other for effective operation.
19.
The ____ provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components.
Correct Answer
B. CP
Explanation
The correct answer is CP, which stands for Certificate Policy. Certificate Policy provides recommended baseline security requirements for the use and operation of Certification Authority (CA), Registration Authority (RA), and other Public Key Infrastructure (PKI) components. It outlines the rules and procedures that govern the issuance, management, and revocation of digital certificates. Certificate Policy ensures the trustworthiness and interoperability of digital certificates within a PKI system.
20.
At the ____ stage of the certificate life cycle, the certificate can no longer be used.
Correct Answer
D. Expiration
Explanation
The expiration stage of the certificate life cycle refers to the point in time when the certificate becomes invalid and can no longer be used for authentication or encryption purposes. This typically occurs when the certificate's validity period has ended, and it needs to be renewed or replaced with a new certificate. Once a certificate has expired, it is no longer considered trustworthy or valid for secure communication.
21.
At the ____ stage of the certificate life cycle, the certificate is no longer valid.
Correct Answer
C. Revocation
Explanation
At the revocation stage of the certificate life cycle, the certificate is no longer valid. Revocation refers to the act of invalidating a certificate before its expiration date due to various reasons such as compromise, loss of trust, or the certificate holder's request. Once a certificate is revoked, it is considered null and void, and any entity relying on it should no longer trust or accept it for authentication or encryption purposes.
22.
Key ____ refers to a process in which keys are managed by a third party, such as a trusted CA.
Correct Answer
A. Escrow
Explanation
The term "escrow" refers to a process where keys are managed by a trusted third party, such as a trusted Certificate Authority (CA). In this process, the third party holds the keys securely and ensures their proper management and distribution. This helps in maintaining the security and integrity of the keys, as they are not solely controlled by the owner but are also accessible to the trusted third party.
23.
Key ____ removes all private and public keys along with the user’s identification information in the CA.
Correct Answer
D. Destruction
Explanation
The correct answer is "destruction". In the given question, it is mentioned that the key removes all private and public keys along with the user's identification information in the CA. This implies that the key is being completely eliminated or destroyed, rather than being renewed, put in escrow, or generated. Therefore, destruction is the appropriate term to describe this action.
24.
is a protocol developed by Netscape for securely transmitting documents over the Internet.
Correct Answer
A. SSL
Explanation
SSL (Secure Sockets Layer) is a protocol developed by Netscape for securely transmitting documents over the Internet. It provides encryption and authentication mechanisms to ensure that data sent between a web server and a client remains confidential and cannot be tampered with. SSL uses cryptographic algorithms to establish a secure connection between the server and the client, allowing sensitive information such as login credentials and credit card details to be transmitted securely. It has been widely used to secure online transactions, email communications, and other sensitive data transfers on the internet.
25.
TLS is an extension of ____.
Correct Answer
C. SSL
Explanation
TLS (Transport Layer Security) is an extension of SSL (Secure Sockets Layer). SSL is a cryptographic protocol that provides secure communication over a network, ensuring that data transmitted between a client and a server remains private and integral. TLS was developed as an updated version of SSL and is widely used to secure internet communications, such as web browsing, email, and file transfers. It enhances the security and performance of SSL, making it the correct answer in this context.
26.
Allows clients and the server to negotiate independently encryption, authentication, and digital signature methods, in any combination, in both directions.
Correct Answer
B. SHTTP
Explanation
SHTTP (Secure HTTP) allows clients and the server to negotiate independently encryption, authentication, and digital signature methods, in any combination, in both directions. This means that both the client and server can agree on the specific encryption, authentication, and digital signature methods to be used for the secure transfer of data. SHTTP provides a secure way to transfer data over HTTP, ensuring confidentiality, integrity, and authenticity of the communication.