PNPKI

PNPKI

Professional Development

20 Qs

quiz-placeholder

Similar activities

Security+ Study Guide-10 Understanding Cryptography and PKI

Security+ Study Guide-10 Understanding Cryptography and PKI

Professional Development

15 Qs

A+ - 11A - Use Management Consoles

A+ - 11A - Use Management Consoles

Professional Development

20 Qs

ITF - Quiz 14.4 - Uses of Encryption

ITF - Quiz 14.4 - Uses of Encryption

Professional Development

15 Qs

Chapter 7 Quiz

Chapter 7 Quiz

Professional Development

23 Qs

E-Commerce

E-Commerce

University - Professional Development

16 Qs

MCQ on digital signature

MCQ on digital signature

Professional Development

25 Qs

CompTIA Sec (IAM & Cryptography)

CompTIA Sec (IAM & Cryptography)

Professional Development

20 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

PNPKI

PNPKI

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Edison Agaoid

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Public Key Infrastructure (PKI)?

A system for managing digital certificates and public-key encryption.

A method for storing passwords securely.

A type of firewall.

An algorithm for data compression.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two main components of PKI?

Public Key and Private Key

Digital Certificates and Cryptography

Root CA and GovCA

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a Certificate Authority (CA)?

To generate private keys.

To sign digital certificates.

To store data securely.

To encrypt data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital certificate?

A file that encrypts data.

A document that verifies the identify of a user or device.

A physical key for access control.

A password management tool.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a public key and a private key in terms of email signing?

Public keys are used for encryption, private keys for decryption.

Public keys are kept secret, private keys are shared.

Public keys are used for signing, private keys for verifying.

Public keys are used for hashing, private keys for salting.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a digital signature work?

It encrypts the message content.

It verifies the sender's identity and message integrity.

It compresses the message to save space.

It translates the message into another language.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Executive Order No. 810, which of the following is the main barrier for growth of electronic commerce and wide use of e-government services in the country?

Lack of fast internet connection

Lack of digital literacy

Lack of security

Lack of applicable policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?