56.
Which choice is not a proper method of managing keys?
- A.Keys frequently in use should be replaced frequently.
- B.Key expiration dates should be carefully monitored.
- C.Memory locations of keys should be overwritten seven times.
- D.Keys may be sent to and reused by a different department.
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Keys are never reused by different departments. Options A, B, and C are all activities that represent appropriate methods to manage keys. |
57.
What is key clustering?
- A.The identification of several keys used in symmetric key algorithms
- B.When two different keys encrypt a plaintext message into the same ciphertext
- C.When one key encrypts a plaintext message into two different cipher text messages
- D.When one key in a keyed hash function generates different message digests
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Key clustering involves two different keys, resulting in the same ciphertext. Option A is incorrect because key clustering does not identify keys. Option C is incorrect because key clustering has nothing to do with timing. Option D is incorrect because key clustering has nothing to do with a keyed hash function. |
58.
Which choice is the most accurate description of a collision?
- A.Two plaintext documents are corrupted when using the same symmetric key.
- B.Two plaintext documents result in the same ciphertext.
- C.Two plaintext documents result in the same hash value.
- D.Two ciphertext documents are decrypted using the same asymmetric key.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
A collision occurs when two plaintext documents result in the same hash value. Option A is incorrect. Symmetric keys do not corrupt plaintext documents. Option B is incorrect because collisions have nothing to do a ciphertext. Option D is incorrect. The decryption function has nothing to do with collisions. |
59.
What is the correct description of a certificate?
- A.A certificate contains the owner’s private key.
- B.A certificate contains the owner’s public key.
- C.A certificate contains the owner’s symmetric key.
- D.A certificate always contains a user’s key.
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Certifi cates always contain the owner’s public key. Option A is incorrect because private keys are private. Option C is incorrect because certifi cates do not have anything to do with symmetric keys. D is incorrect because there is no such thing as a user’s key. |
60.
Which of the following is not part of a certificate’s trust architecture?
- A.Certificate authority
- B.Registration authority
- C.Certificate gateway
- D.Certificate revocation list
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The trust architecture does not include a certifi cate gateway. Options A, B, and D are part of the trust architecture. |