IT CertificationsAnswer Key

Csr Security Plus

14 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

CA (Certificate Authority)

ANSWER

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

QUESTION 2

CRL (Certificate Revocation List) and OCSP (Online Certificate Status Protocol)

ANSWER

Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers)

QUESTION 3

OCSP (Online Certificate Status Protocol)

ANSWER

What is the fastest way for validating a digital certificate?

QUESTION 4

CSR (Certificate Signing Request)

ANSWER

Which of the answers listed below refers to a method for requesting a digital certificate?

QUESTION 5

OCSP stapling

ANSWER

Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?

QUESTION 6

HTTP Public Key Pinning (HPKP)

ANSWER

A security mechanism that allows HTTPS websites to resist impersonation by attackers using fraudulent certificates is called:

QUESTION 7

Single CA Model, Hierarchical model (root CA + intermediate CAs), Mesh Model (cross-certifying CAs), Web of trust model (all CAs act as root CAs), Client-server mutual authentication model

ANSWER

Which of the answers listed below refer to examples of PKI trust models?

QUESTION 8

key escrow

ANSWER

A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:

QUESTION 9

True

ANSWER

The term "Certificate chaining" refers to a process of verifying the authenticity of a newly received digital certificate. Such process involves checking all of the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate's chain is properly issued and valid.

QUESTION 10

wildcard certificate

ANSWER

Which digital certificate type allows multiple subdomains to be protected by a single certificate?

QUESTION 11

Subject Alternative Name (SAN) certificate

ANSWER

A digital certificate which allows multiple domains to be protected by a single certificate is known as:

QUESTION 12

DER (Distinguished Encoding Rules)

ANSWER

Which of the following certificate formats is used to store a binary representation of a digital certificate?

QUESTION 13

PEM (Privacy Enhanced Mail)

ANSWER

Which of the answers listed below refers to the most common format in which Certificate Authorities (CA) issue certificates?

QUESTION 14

PFX and P12

ANSWER

Which digital certificate formats are commonly used to store private keys? (Select 2 answers)

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials