a) Securely store private keys
b) Verify the authenticity of a public key
c) Encrypt email messages
d) Manage user passwords
Answer: b) Verify the authenticity of a public key
a) Certificate issuance
b) Certificate revocation
c) Certificate validation
d) Certificate encryption
Answer: c) Certificate validation
a) Registration Authority (RA)
b) Certificate Revocation List (CRL)
c) Certification Authority (CA)
d) Public Key Infrastructure (PKI)
Answer: c) Certification Authority (CA)
a) To list all certificate holders
b) To authenticate users
c) To verify digital signatures
d) To identify revoked certificates
Answer: d) To identify revoked certificates
Answer: d) To identify revoked certificates
a) RSA
b) DES
c) MD5
d) HMAC
Answer: a) RSA
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
Answer: b) Integrity
a) HTTP
b) SMTP
c) POP3
d) FTP
Answer: b) SMTP
a) Encrypt messages
b) Verify signatures
c) Decrypt messages
d) Store passwords
Answer: b) Verify signatures
a) Public Key
b) Private Key
c) Session Key
d) Master Key
Answer: b) Private Key
*a) End-users
b) Root CA
c) Registration Authority (RA)
d) Web browsers**
b) Root CA
a) Public Key
b) Registration Authority (RA)
c) Certificate Revocation List (CRL)
d) Encryption Algorithm
b) Registration Authority (RA)
a) X.509
b) PKCS#7
c) PEM
d) PGP
Answer: a) X.509
a) A series of CA certificates
b) A secure VPN connection
c) The process of encryption
d) A type of digital signature
a) A series of CA certificates
a) To store public keys
b) To recover lost private keys
c) To authenticate users
d) To issue digital certificates
b) To recover lost private keys
a) Certificate Authority (CA)
b) Public Key
c) Registration Authority (RA)
d) Key Management System (KMS)
Answer: c) Registration Authority (RA)
a) SHA-256
b) MD5
c) SHA-1
d) HMAC-SHA-512
b) MD5
a) To encrypt email messages
b) To issue digital certificates
c) To verify the revocation status of a certificate
d) To manage encryption keys
c) To verify the revocation status of a certificate
a) Public Key
b) To store private keys securely
c) Certification Authority (CA)
Question 21: What is the primary role of the public key in RSA encryption?
A) To encrypt data
B) To decrypt data
C) To protect the private key
D) To generate digital certificates
Answer: A) To encrypt data
Question 2: According to the book’s content, why is it crucial to select large prime numbers when generating RSA keys?
A) To speed up encryption
B) To ensure reversibility
C) To increase security
D) To reduce modulus size
Answer: C) To increase security
Question 3: In RSA encryption, what is the term for converting plaintext into ciphertext?
A) Encoding
B) Hashing
C) Decryption
D) Encryption
Answer: D) Encryption
Question 4: As per the book, what is the primary purpose of digital certificates in PKI (Public Key Infrastructure)?
A) To encrypt data
B) To protect the private key
C) To prove entity identity
D) To generate symmetric keys
Answer: C) To prove entity identity