Cryptography & PKI | Test-2

0%
0

Cryptography & PKI | Test-2

This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.

1 / 24

1. Where all of the following is cryptography can be applied?

2 / 24

2. The terms Certificate Authority, Registration Authority, and Certificate
Revocation Lists are all part of?

3 / 24

3. A _______ is like a secure, electronic fingerprint for your digital documents or messages. It’s a unique bit of code attached to the document that verifies its authenticity and integrity, proving it hasn’t been tampered with. Imagine it as a special seal on your document, but one that uses advanced cryptography instead of wax!

4 / 24

4. Digital signatures are used for:

5 / 24

5. Which among the following is the framework designed to verify and authenticate the identity of entities within the enterprise engaging in data exchange?

6 / 24

6. A ________ is an electronic document that verifies the identity of an entity, such as an individual, a device, or a website. It contains information about the entity’s public key and is digitally signed by a trusted third party called a Certificate Authority (CA).

7 / 24

7. Which of the following does a digital certificate contains:

8 / 24

8. Digital certificates are used for:

9 / 24

9. Which of the following issues digital certificates?

10 / 24

10. What distinguishes a public and private key system from symmetric systems?

11 / 24

11. The most effective protection against disclosure attacks when passwords are kept in a database is achieved by using:

12 / 24

12. The equation used to calculate the total number of symmetric keys needed for N communicating participants is:

13 / 24

13. One advantage of using digital signatures is that they can provide features that symmetric key cryptography design is unable to provide?

14 / 24

14. Key distribution issues arise in symmetric key systems due to __________.

15 / 24

15. Which Public Key Infrastructure (PKI) component authenticates the applicant?

16 / 24

16. When using public key cryptography, the sender encrypts with _____ key of the receiver.

17 / 24

17. A ____________, also known as a fingerprint or hash value, is a unique and fixed-size string of characters generated through a cryptographic hash function applied to a digital certificate. It serves as a compact representation of the entire certificate, capturing its contents in a way that is easily verifiable.

18 / 24

18. Which of the following algorithms is frequently utilized to generate digital certificate thumbprints?

19 / 24

19. The equation used to calculate the total number of asymmetric keys needed for N communicating participants is:

20 / 24

20. When using public key cryptography, the receiver decrypts data with _____ key of the receiver

21 / 24

21. Which of the following describes a standard algorithm for symmetric cryptography?

22 / 24

22. The best term to describe hashing among the following is?

23 / 24

23. Which type of security control does encryption of data provides?

24 / 24

24. Which of the following is a cryptographic attack?

Your score is

The average score is 0%

0%


Related challenges :