pki Flashcards

(50 cards)

1
Q
  1. Question: What is the primary function of a digital certificate in PKI?

a) Securely store private keys
b) Verify the authenticity of a public key
c) Encrypt email messages
d) Manage user passwords

A

Answer: b) Verify the authenticity of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Question: In PKI, what is the term for the process of confirming the validity of a certificate before accepting it for use?

a) Certificate issuance
b) Certificate revocation
c) Certificate validation
d) Certificate encryption

A

Answer: c) Certificate validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Question: Which component in PKI is responsible for digitally signing certificates?

a) Registration Authority (RA)
b) Certificate Revocation List (CRL)
c) Certification Authority (CA)
d) Public Key Infrastructure (PKI)

A

Answer: c) Certification Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Question: What is the purpose of the Certificate Revocation List (CRL) in PKI?

a) To list all certificate holders
b) To authenticate users
c) To verify digital signatures
d) To identify revoked certificates

Answer: d) To identify revoked certificates

A

Answer: d) To identify revoked certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Question: Which cryptographic algorithm is commonly used for digital signatures in PKI?

a) RSA
b) DES
c) MD5
d) HMAC

A

Answer: a) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Question: What does a digital signature provide in PKI?

a) Confidentiality
b) Integrity
c) Authentication
d) Availability

A

Answer: b) Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Question: Which protocol is often used for secure email communication in PKI?

a) HTTP
b) SMTP
c) POP3
d) FTP

A

Answer: b) SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Question: In a PKI, what is the purpose of the Public Key?

a) Encrypt messages
b) Verify signatures
c) Decrypt messages
d) Store passwords

A

Answer: b) Verify signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Question: Which key is typically kept secret in a PKI key pair?

a) Public Key
b) Private Key
c) Session Key
d) Master Key

A

Answer: b) Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Question: Which entity is responsible for managing the issuance and revocation of digital certificates in a hierarchical PKI?

*a) End-users
b) Root CA
c) Registration Authority (RA)
d) Web browsers**

A

b) Root CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Question: Which PKI component confirms the identity of certificate applicants?

a) Public Key
b) Registration Authority (RA)
c) Certificate Revocation List (CRL)
d) Encryption Algorithm

A

b) Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Question: Which certificate format is commonly used for securing email communication in PKI?

a) X.509
b) PKCS#7
c) PEM
d) PGP

A

Answer: a) X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Question: What does the term “Chain of Trust” refer to in PKI?

a) A series of CA certificates
b) A secure VPN connection
c) The process of encryption
d) A type of digital signature

A

a) A series of CA certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Question: What is the purpose of the Key Escrow in PKI?

a) To store public keys
b) To recover lost private keys
c) To authenticate users
d) To issue digital certificates

A

b) To recover lost private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Question: Which PKI component verifies the identity of users or entities before issuing a certificate?

a) Certificate Authority (CA)
b) Public Key
c) Registration Authority (RA)
d) Key Management System (KMS)

A

Answer: c) Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Question: Which cryptographic hash function is considered insecure and should be avoided in PKI?

a) SHA-256
b) MD5
c) SHA-1
d) HMAC-SHA-512

A

b) MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Question: In PKI, what is the purpose of the Online Certificate Status Protocol (OCSP)?

a) To encrypt email messages
b) To issue digital certificates
c) To verify the revocation status of a certificate
d) To manage encryption keys

A

c) To verify the revocation status of a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Question: Which type of key is used to establish secure communication in PKI?
    a) Public Key
    b) Private Key
    c) Shared Key
    d) Secret Key
A

a) Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Question: What is the purpose of a Hardware Security Module (HSM) in PKI?
    a) To issue digital certificates
    b) To store private keys securely
    c) To encrypt email messages
    d) To validate digital signatures
A

b) To store private keys securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Question: Which PKI component is responsible for creating and managing digital certificates for users and devices?
    a) Certificate Revocation List (CRL)
    b) Registration Authority (RA)
    c) Certification Authority (CA)
    d) Public Key
A

c) Certification Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Question 21: What is the primary role of the public key in RSA encryption?

A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To generate digital certificates

A

Answer: A) To encrypt data

22
Q

Question 2: According to the book’s content, why is it crucial to select large prime numbers when generating RSA keys?

A) To speed up encryption
B) To ensure reversibility
C) To increase security
D) To reduce modulus size

A

Answer: C) To increase security

23
Q

Question 3: In RSA encryption, what is the term for converting plaintext into ciphertext?

A) Encoding
B) Hashing
C) Decryption
D) Encryption

A

Answer: D) Encryption

24
Q

Question 4: As per the book, what is the primary purpose of digital certificates in PKI (Public Key Infrastructure)?

A) To encrypt data
B) To protect the private key
C) To prove entity identity
D) To generate symmetric keys

A

Answer: C) To prove entity identity

25
Question 5: In RSA encryption, what happens when two ciphered values are multiplied together? A) They sum up B) They subtract C) They divide D) They multiply
Answer: D) They multiply
26
Question 6: According to Fermat's Little Theorem, what is the result when a number "a" is raised to (p-1) mod p, where "p" is a prime number? A) 0 B) 1 C) 2 D) p
Answer: B) 1
27
Question 7: What role does the exponent "e" play in the encryption key pair of RSA encryption? A) To encrypt data B) To decrypt data C) To protect the private key D) To prove entity identity
Answer: A) To encrypt data
28
Question 8: In the book's context, what does "commutative encryption" in RSA allow? A) Secure public network communication B) Faster encryption and decryption C) Encryption and decryption in any order D) Stronger encryption keys
Answer: C) Encryption and decryption in any order
29
Question 9: In RSA encryption, what mathematical property enables decryption of two ciphered values to yield the result of their multiplication? A) Homomorphic encryption B) Commutative property C) Associative property D) Distributive property
Answer: A) Homomorphic encryption
30
Question 10: What is the primary objective of RSA encryption's partially homomorphic cryptosystem, as per the book? A) To perform operations with plaintext values B) To enable decryption without keys C) To allow encryption of messages with varying lengths D) To perform operations with ciphered values
Answer: D) To perform operations with ciphered values
31
Question 11: What is the primary purpose of the private key in RSA encryption? A) To encrypt data B) To decrypt data C) To verify digital signatures D) To protect the public key
Answer: B) To decrypt data
32
Question 12: In RSA encryption, how is the public key typically distributed in a PKI? A) It is kept secret by the entity B) It is transmitted over insecure channels C) It is published in a public directory D) It is used for symmetric key encryption
Answer: C) It is published in a public directory
33
Question 13: What is the term for the process of converting ciphertext back into plaintext in RSA encryption? A) Decoding B) Hashing C) Encryption D) Decryption
Answer: D) Decryption
34
Question 14: In the book's explanation of RSA encryption, which mathematical concept is fundamental to the algorithm and involves the decomposition of composite numbers into prime factors? A) Fermat's Little Theorem B) Modular arithmetic C) Factorization D) Homomorphic encryption
Answer: C) Factorization
35
Question 15: According to the book, what property of RSA encryption allows mathematical operations to be performed with ciphered values? A) Symmetric encryption B) Homomorphic cryptosystem C) Digital certificate authentication D) Prime number generation
Answer: B) Homomorphic cryptosystem
36
Question 16: What does the acronym "PKI" stand for in the context of RSA encryption? A) Public Key Identification B) Private Key Infrastructure C) Public Key Infrastructure D) Prime Key Identifier
Answer: C) Public Key Infrastructure
37
Question 17: Based on the book's content, what is the key length of the example public key mentioned in the text? A) 256 bits B) 512 bits C) 1024 bits D) 2048 bits
Answer: B) 512 bits
38
Question 18: According to the book's explanation of commutative encryption using RSA, what is the primary purpose of generating two key pairs with shared values? A) To ensure message integrity B) To allow decryption in any order C) To increase encryption speed D) To strengthen encryption security
Answer: B) To allow decryption in any order
39
Question 19: What is the primary function of the modulus (N) in RSA encryption, as mentioned in the book? A) To ensure data integrity B) To generate digital certificates C) To protect the private key D) To facilitate mathematical operations
Answer: D) To facilitate mathematical operations
40
Question 20: According to the book's content, which component of RSA encryption is used to protect the symmetric key in scenarios like disk encryption? A) Public key B) Modulus (N) C) Exponent (e) D) Private key
Answer: A) Public key
41
Question 21: In RSA encryption, what is the term used for converting plaintext into ciphertext? A) Encoding B) Hashing C) Decryption D) Encryption
Answer: D) Encryption
42
Question 22: In RSA encryption, what is the result of multiplying two ciphered values? A) The sum of the two values B) The subtraction of the two values C) The division of the two values D) The product of the two values
Answer: D) The product of the two values
43
Question 23: In RSA encryption, what is the primary role of the public key? A) To decrypt data B) To protect the private key C) To generate digital signatures D) To encrypt data
Answer: D) To encrypt data
44
Question 24: As mentioned in the book's content, what is the significance of selecting large prime numbers when generating RSA keys? A) It speeds up the encryption process B) It ensures that encryption is reversible C) It increases the security of the key pair D) It reduces the size of the modulus
Answer: C) It increases the security of the key pair
45
Question 25: In RSA encryption, what is the term used for the process of converting plaintext into ciphertext? A) Encoding B) Hashing C) Decryption D) Encryption
Answer: D) Encryption
46
Question 26: As mentioned in the book's content, what is the primary purpose of digital certificates in the context of public key infrastructure (PKI)? A) To encrypt data B) To protect the private key C) To prove the identity of entities D) To generate symmetric keys
Answer: C) To prove the identity of entities
47
Question 27: In RSA encryption, what is the result of multiplying two ciphered values? A) The sum of the two values B) The subtraction of the two values C) The division of the two values D) The product of the two values
Answer: D) The product of the two values
48
Question 28: According to Fermat's Little Theorem, what should the result be when a number "a" is raised to the power of (p-1) mod p, where "p" is a prime number? A) 0 B) 1 C) 2 D) p
Answer: B) 1
49
uestion 29: In RSA encryption, what is the primary role of the exponent "e" in the encryption key pair? A) To encrypt data B) To decrypt data C) To protect the private key D) To prove the identity of entities
Answer: A) To encrypt data
50
Question 30: According to the book's content, what does commutative encryption in RSA allow for? A) Secure communication over public networks B) Faster encryption and decryption C) Encryption and decryption in any order D) Stronger encryption keys
Answer: C) Encryption and decryption in any order