Cryptography & PKI | Test-3

0%
0

Cryptography & PKI | Test-3

This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.

1 / 25

1. Which algorithm produces 160-bit message digest on 512-bit blocks and also uses padding

2 / 25

2. What is the weakness of SHA-1?

3 / 25

3. Among the following, what is the key characteristic of Public Key Infrastructure (PKI)?

4 / 25

4. The following are all included in cryptographic protection EXCEPT

5 / 25

5. Which of the following is the successor of SSL?

6 / 25

6. When compared with asymmetric algorithms, which of the following is a strength of symmetric key cryptography?

7 / 25

7. Which among the following BEST describes a characteristic of Public Key Infrastructure (PKI)?

8 / 25

8. The product of two large prime numbers is factored to create this asymmetry cipher

9 / 25

9. Which of the following security programs represents an asymmetric encryption implementation?

10 / 25

10. In a Public Key Infrastructure (PKI), what is the function of a root Certificate Authority (CA)?

11 / 25

11. What is the standard format which defines Digital certificates:

12 / 25

12. ___________ are trusted entities responsible for issuing digital certificates that verify the authenticity of a user, device, or website on the internet. Choose the general term.

13 / 25

13. _____________are entities that assist Certificate Authorities (CAs) in the process of verifying and authenticating the information provided by individuals or entities requesting digital certificates.

14 / 25

14. _____________ validates that each certificate in a certificate path from the original root of trust down to the server or client in question is valid and legitimate. Choose the correct word

15 / 25

15. What is the self-signed top-level certificate of the certificate authority (CA) called? It is the certificate which doesnโ€™t require verification and generally trusted among all. Choose the right term among the following:

16 / 25

16. An _________ is a digital document issued by a trusted authority (Certificate Authority, or CA) that acts as a bridge between a root certificate (the most trusted in the chain) and a server certificate (issued to a specific website or service) . Choose the right term.

17 / 25

17. A ______ is a secure repository or file that stores cryptographic keys, certificates, and other sensitive credentials. Choose the right term.

18 / 25

18. A ______ is a secure repository or file that stores trusted digital certificates used in SSL/TLS communication. It contains public keys of trusted entities, such as Certificate Authorities (CAs), enabling a system to verify the authenticity of certificates presented during secure connections.

19 / 25

19. During a digital certificate verification, after checking the CAโ€™s digital signature using the CAโ€™s public key, you must check and ensure that the certificate was not published on a ________. Choose the correct term.

20 / 25

20. When is a certificate added to a Certificate Revocation List (CRL)?

21 / 25

21. The major disadvantage of checking with Certificate Revocation Lists(CRLs) is:

22 / 25

22. What distinguishes the RSA and AES algorithms from one another?

23 / 25

23. Which method works best for storing user passwords in a database?

24 / 25

24. Which of the following is used in symmetric key cryptography?

25 / 25

25. ____________ is a set of specifications defined by the National Institute of Standards and Technology (NIST) for generating and verifying digital signatures.

Your score is

The average score is 0%

0%


Related challenges :