Cryptography Questions and Answers – Public Keys and X.509 Certificates-III

This set of Cryptography Problems focuses on “Public Keys and X.509 Certificates”.

1. How many handshake rounds are required in the Public-Key Distribution Scenario?
a) 7
b) 5
c) 3
d) 4
View Answer

Answer: a
Explanation: A total of seven messages are required in the Public-Key distribution scenario.

2. A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____
a) time stamping
b) polling
c) caching
d) squeezing
View Answer

Answer: c
Explanation: This technique is known as caching.

3. X.509 certificate recommends which cryptographic algorithm?
a) RSA
b) DES
c) AES
d) Rabin
View Answer

Answer: a
Explanation: RSA is the recommended cryptographic algorithm for X.509 certificates.
advertisement
advertisement

4. The issuer unique identifier of the X.509 certificates was added in which version?
a) 1
b) 2
c) 3
d) 4
View Answer

Answer: b
Explanation: The issuer unique identifier was added in the 2nd version.

5. The period of validity consists of the date on which the certificate expires.
a) True
b) False
View Answer

Answer: b
Explanation: The Period of validity consists of 2 dates: the first and last date on which the certificate is valid.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?
a) Subject and Issuer attributes
b) Key and Policy information
c) Certification path constraints
d) All of the above are Certificate extensions categories
View Answer

Answer: d
Explanation: Subject and Issuer attributes, Key and Policy information and Certification path constraints are the three categories of Certificate extensions.

7. What does the above figure represent?
The figure is a representation of Hierarchy in X.509

advertisement

a) Hierarchical in X.509
b) IPsec connectivity
c) TCP nodes and links
d) None of the mentioned
View Answer

Answer: a
Explanation: The figure is a representation of Hierarchy in X.509.

8. How many functions are involved in the PKIX architectural model?
a) 3
b) 5
c) 6
d) 7
View Answer

Answer: d
Explanation: The 7 functions are: Registration, Initialization, Certification, Key pair recovery, Key pair update, Revocation request and Cross certification.
advertisement

9. CMP stands for
a) cipher message protocol
b) cipher management protocol
c) certificate message protocol
d) none of the mentioned
View Answer

Answer: d
Explanation: CMP stands for certificate management protocol.

10. CMS stands for
a) cipher message syntax
b) certificate message session
c) cryptographic message syntax
d) none of the mentioned
View Answer

Answer: c
Explanation: CMS stands for cryptographic message syntax.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice problems on all areas of Cryptography, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.