1. What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)
- digital certificates
- pre-shared key generation
- intrusion prevention system
- certificate authority
- symmetric encryption algorithms
2. What is the purpose of code signing?
- integrity of source .EXE files
- data encryption
- source identity secrecy
- reliable transfer of data
3. Which statement describes the use of certificate classes in the PKI?
- Email security is provided by the vendor, not by a certificate.
- The lower the class number, the more trusted the certificate.
- A vendor must issue only one class of certificates when acting as a CA.
- A class 5 certificate is more trustworthy than a class 4 certificate.
4. What role does an RA play in PKI?
- a root CA
- a super CA
- a subordinate CA
- a backup root CA
5. Which protocol uses X.509 certificates to support mail protection performed by mail agents?
6. What protocol is used to query the revocation status of an X.509 certificate?
7. In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?
- HTTPS traffic does not require authentication.
- HTTPS traffic enables end-to-end encryption.
- HTTPS traffic is much faster than HTTP traffic.
- HTTPS traffic can carry a much larger data payload than HTTP can carry.
8. Which technology is used to provide assurance of the authenticity and integrity of software code?
- public key infrastructures
- block ciphers
- certificate authorities
- digital signatures
9. Which CA class of digital certificates would be used by individuals to perform email verification?
10. What is a purpose of a digital certificate?
- to support large-scale distribution and identification of public encryption keys
- to authenticate and verify that a user who is sending a message is who they claim to be
- to query for the revocation status of an X.509 certificate
- to assure the authenticity and integrity of software code
11. What is an appropriate use for class 5 digital certificates?
- used for online business transactions between companies
- used for private organizations or government security
- used by organizations for which proof of identity is required
- used for testing in situations in which no checks have been performed