Quiz - Cryptography and The Public Key Infrastructure - Attempt Review2
Quiz - Cryptography and The Public Key Infrastructure - Attempt Review2
Question 1
Incorrect
0 points out of 1
During the encryption process, where symmetric and asymmetric cryptography are used, which key is used to encrypt the session (symmetric)
key?
Select one:
The sender’s private key
The sender’s public key
The receiver’s private key
The receiver’s public key
Question 2
Correct
1 points out of 1
https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 1/4
5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review
Question 3
Correct
1 points out of 1
Question 4
Correct
1 points out of 1
Question 5
Correct
1 points out of 1
Select one:
A method for ensuring network safety
The study of writing or solving codes
The process of converting plaintext to ciphertext
A secure session between a web browser and a web server
https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 2/4
5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review
Question 6
Correct
1 points out of 1
Question 7
Correct
1 points out of 1
Select one:
Local municipal laws in which the CA resides
PKI policy and procedures
The registration authority
The private key of the root CA
Question 8
Incorrect
0 points out of 1
Which two security requirements are satisfied by a digital signature? (Choose two.)
https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 3/4
5/14/24, 1:46 PM Quiz: Cryptography and the Public Key Infrastructure: Attempt review
Question 9
Incorrect
0 points out of 1
Select one:
The art of writing or solving codes
The process of converting plaintext to ciphertext
The process of generating a unique value that can be tied legally to an entity
The process of converting data of an arbitrary size to a unique value of a fixed size
Question 10
Correct
1 points out of 1
What ingredient is added during the BCRYPT key stretching process to increase entropy?
Select one:
A static known value
MAC
Salt
Verification code
https://training.fortinet.com/mod/quiz/review.php?attempt=18979115&cmid=485444 4/4