Example questions 1.What is the role of the private key of the root Certificate Authority (CA) in digital certificates?It is used to verify the identity of the user.It is used to generate public keys.It is used to sign the certificate.It is used to encrypt data.
2.Which key is used by a business to prove its identity to customers?Public key of the company Private key of the root CA Public key of the root CA Private key of the company 3.Which standard is used for importing and exporting all items written using X.509 that are part of a chain of trust?
CER Public Key Cryptography Standard (PKCS) #12 RTF Public Key Cryptography Standard (PKCS) #7 4.Describe the significance of the hash field in an X.509 certificate.The hash field contains the public key of the issuer.The hash field ensures the integrity of the certificate by allowing verification that it has not been altered.The hash field indicates the expiration date of the certificate.The hash field lists the certificate's serial number.D334 Intro to Cryptography
WGU PA
kmagno94 Created 27/09/25 Save Configure Take this test
5.What is the purpose of a thumbprint in the context of a digital certificate?It uniquely identifies the certificate.It shows the issuer of the certificate.It contains the public key of the certificate.It indicates the certificate's expiration date.
6.Describe the role of the cancellation process in certificate management and how it relates to key recovery.The cancellation process involves the initial setup of a certificate authority.The cancellation process is used to issue new certificates to users.The cancellation process in certificate management allows for the recovery of keys when a certificate is no longer valid or has been compromised.The cancellation process is unrelated to key recovery and focuses on certificate renewal.
7.What is the primary action a root Certificate Authority (CA) takes before releasing its certificate?Encrypting it with its private key Signing it with its public key Encrypting it with its public key Signing it with its private key 8.What is the primary purpose of the SHA-1 algorithm in the context of digital certificates?To encrypt data using symmetric key encryption To manage public key infrastructure To generate the thumbprint of a certificate To sign digital documents 9.In a scenario where a company needs to encrypt sensitive customer data and share the encryption keys with multiple partners, which method should they implement based on the principles discussed?Encrypt using asymmetric keys and distribute using asymmetric keys.Encrypt using symmetric keys and distribute using symmetric keys.Encrypt using asymmetric keys and distribute using symmetric keys.Encrypt using symmetric keys and distribute using asymmetric keys.
10.Describe the relationship between public and private keys in asymmetric encryption.Both keys are used interchangeably for encryption and decryption.
Private keys are shared among users for encryption purposes.In asymmetric encryption, a public key is used for encryption, while a private key is used for decryption.Public keys are used for both encryption and decryption, while private keys are not used at all.