1. True or false. Instant messaging can be encrypted using PKI.
Explanation: Instant messaging can be encrypted using PKI.
2. True or false. PKI can be used by the enterprise to secure USB storage devices.
Explanation: USB storage devices can be encrypted using PKI.
3. What must be specified by the X509v3 validity date range? (choose two)
- after
- before
- not after
- not before
Explanation: The X.509v3 certificates specify “not before” and “not after” dates. If the current date is outside the range, the web browser displays a message.
4. Which of the following is not a key component of the cipher suite?
- message authentication code (MAC)
- authentication algorithm
- encryption algorithm
- the key exchange algorithm
- authorization algorithm
Explanation: The key components of the cipher suite are the Message Authentication Code Algorithm (MAC), the encryption algorithm, the key exchange algorithm, and the authentication algorithm. These can be changed without replacing the entire protocol.