CL

PKI Test

  1. ______ is the standard that defines the format used with public-key digital certificates.

    • x.509

    • x.400

    • X.409

    • x.500

  2. An entity looking to obtain a digital certificate will create and submit a _____ to the CA to formally request the certificate.

    • CSR

    • PEM

    • PKCS

    • registration authority

  3. Which mechanisms from the list below can be checked to verify the validity of a digital certificate? Select two.

    • CRL And OCSP

    • OCSP AND PEM

    • CSR AND CA

    • OSCP AND CRL

  4. What action does a CA take prior to publishing a CRL to ensure the list can be validated as authentic by those checking it for certificate statuses?

    • CA signs the list with the CA's own private key

    • CA duplicates the list

    • CA signs the list with the CA's own public key

  5. _____ is a public-key cryptography standard used to sign and/or encrypt messages for PKI.

    • PKCS #7

    • PKCS #9

    • PKCS #12

    • PKCS #5

  6. An entity looking to obtain a digital certificate must first generate ____.

    • an asymmetric key pair

    • a symmetric key

    • a registration authority

    • a certificate authority

  7. Certificate creation occurs during which stage of certificate management?

    • Initialization

    • Issued

    • Cancellation

    • Hold

  8. Certificate revocation lists are published by _____.

    • the issuing CA

    • the certificate holder

    • any certificate authority

    • NIST

  9. The timeframe a digital certificate is considered to be valid and can be trusted is known as the _____.

    • period of validity

    • CRL

    • CSR

    • cancellation stage

  10. Which encoding scheme for X.509 certificates supports binary format?

    • DER

    • PEM

    • IKE

    • CSR

  11. Certificate validation occurs during which stage of certificate management?

    • Issued

    • Initialization

    • Cancellation

    • Hold

  12. Public key cryptography involves the use of a ____ for encryption and decryption.

    • key pair (one private key, one public key)

    • key pair (one private key, one secret key)

    • single private key

  13. If Shawn were to generate a CSR to submit to a CA, what PKCS standard would be used?

    • PKCS #10

    • PKCS #5

    • PKCS #7

    • PKCS #12

  14. A ____ is a trusted third party that creates and issues digital certificates.

    • CA

    • RA

    • CSR

    • DER

  15. An entity seeking a digital certificate will provide the CA with ___ and ____ as part of the initial request.

    • a CSR; their public key

    • a CSR; their private key

    • their public key; their private key

  16. Which public-key cryptography standard is used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust?

    • PKCS #12

    • PKCS #9

    • PKCS #5

    • PKCS #7

  17. Certificate revocation occurs during which stage of certificate management?

    • Cancellation

    • Initialization

    • Issued

    • Hold

  18. ___ describes the condition where a certificate is moved to an invalid or untrusted state before its original expiration date that cannot be reversed.

    • revoked

    • Hold

    • Retrieval

    • Intermediate

  19. A ___ validates the unique identifying information and public key information submitted by a requester and creates a digital certificate which essentially binds the requester's identity and public key to the certificate.

    • CA

    • CSR

    • RA

    • CRL

  20. Which encoding scheme for X.509 certificates supports Base64 and ASCII text formats?

    • PEM

    • DER

    • CSR

    • IKE

  21. Which common X.509 certificate file type supports formats used by the PEM and DER encoding schemes?

    • .CER

    • .mpg

    • .crt

    • .csr

  22. Certificate expiration occurs during which stage of certificate management?

    • Cancellation

    • Initialization

    • Issued

    • Hold

  23. What will a certificate authority (CA) do just before issuing a digital certificate to a requesting entity?

    • CA will sign the certificate with its own private key

    • CA will sign the certificate with the requester’s public key

    • CA will sign the certificate with its own public key

    • CA will pad the certificate

  24. _____ is a public-key cryptography standard used for password-based encryption.

    • PKCS #5

    • PKCS #9

    • PKCS #12

    • PKCS #7

  25. ___ describes the condition where a certificate is moved to an invalid or untrusted state prior to its original expiration date, that can be reversed following investigation resolution.

    • Hold

    • revoked

    • Retrieval

    • Intermediate