Home
You may like this!
56.
Which choice is not a proper method of managing keys?
  • A.
    Keys frequently in use should be replaced frequently.
  • B.
    Key expiration dates should be carefully monitored.
  • C.
    Memory locations of keys should be overwritten seven times.
  • D.
    Keys may be sent to and reused by a different department.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Keys are never reused by different departments. Options A, B, and C are all activities that represent appropriate methods to manage keys.
Report
Name Email  
57.
What is key clustering?
  • A.
    The identification of several keys used in symmetric key algorithms
  • B.
    When two different keys encrypt a plaintext message into the same ciphertext
  • C.
    When one key encrypts a plaintext message into two different cipher text messages
  • D.
    When one key in a keyed hash function generates different message digests
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Key clustering involves two different keys, resulting in the same ciphertext. Option A is incorrect because key clustering does not identify keys. Option C is incorrect because key clustering has nothing to do with timing. Option D is incorrect because key clustering has nothing to do with a keyed hash function.
Report
Name Email  
58.
Which choice is the most accurate description of a collision?
  • A.
    Two plaintext documents are corrupted when using the same symmetric key.
  • B.
    Two plaintext documents result in the same ciphertext.
  • C.
    Two plaintext documents result in the same hash value.
  • D.
    Two ciphertext documents are decrypted using the same asymmetric key.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A collision occurs when two plaintext documents result in the same hash value. Option A is incorrect. Symmetric keys do not corrupt plaintext documents. Option B is incorrect because collisions have nothing to do a ciphertext. Option D is incorrect. The decryption function has nothing to do with collisions.
Report
Name Email  
59.
What is the correct description of a certificate?
  • A.
    A certificate contains the owner’s private key.
  • B.
    A certificate contains the owner’s public key.
  • C.
    A certificate contains the owner’s symmetric key.
  • D.
    A certificate always contains a user’s key.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Certifi cates always contain the owner’s public key. Option A is incorrect because private keys are private. Option C is incorrect because certifi cates do not have anything to do with symmetric keys. D is incorrect because there is no such thing as a user’s key.
Report
Name Email  
60.
Which of the following is not part of a certificate’s trust architecture?
  • A.
    Certificate authority
  • B.
    Registration authority
  • C.
    Certificate gateway
  • D.
    Certificate revocation list
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The trust architecture does not include a certifi cate gateway. Options A, B, and D are part of the trust architecture.
Report
Name Email