MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
“Conveys any desired X.500 directory attribute values for the subject of this certificate.”Which Extension among the following does this refer to? |
| A. | Subject alternative name |
| B. | Issuer Alternative name |
| C. | Subject directory attributes |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 2. |
The criticality indicator indicates whether an extension can be safely ignored. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 3. |
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as – |
| A. | X2 X1 X1 B |
| B. | X1 X1 X2 A |
| C. | X1 X2 X2 B |
| D. | X1 X2 X2 A |
| Answer» D. X1 X2 X2 A | |
| 4. |
THE_CRITICALITY_INDICATOR_INDICATES_WHETHER_AN_EXTENSION_CAN_BE_SAFELY_IGNORED.?$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 5. |
“Conveys_any_desired_X.500_directory_attribute_values_for_the_subject_of_this_certificate.”$# |
| A. | |
| B. | Subject alternative name |
| C. | Issuer Alternative name |
| Answer» D. | |
| 6. |
Which of the following is not a part of an Extension? |
| A. | Extension Identifier |
| B. | Extension value |
| C. | Criticality Indicator |
| D. | All of the mentioned constitute the Extension |
| Answer» E. | |
| 7. |
CRL stands for |
| A. | Cipher Reusable List |
| B. | Certificate Revocation Language |
| C. | Certificate Revocation List |
| D. | Certificate Resolution Language |
| Answer» D. Certificate Resolution Language | |
| 8. |
It is desirable to revoke a certificate before it expires because |
| A. | the user is no longer certified by this CA |
| B. | the CA’s certificate is assumed to be compromised |
| C. | the user’s private key is assumed to be compromised |
| D. | all of the mentioned |
| Answer» E. | |
| 9. |
Certificates generated by X that are the certificates of other CAs are Reverse Certificates. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –$ |
| A. | X2 X1 X1 B |
| B. | X1 X1 X2 A |
| C. | X1 X2 X2 B |
| D. | X1 X2 X2 A |
| Answer» D. X1 X2 X2 A | |
| 11. |
Which of the following is not an element/field of the X.509 certificates? |
| A. | Issuer Name |
| B. | Serial Modifier |
| C. | Issuer unique Identifier |
| D. | Signature |
| Answer» C. Issuer unique Identifier | |
| 12. |
The subject unique identifier of the X.509 certificates was added in which version? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 13. |
Extensions were added in which version? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» D. 4 | |