(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)
(Which operation can be performed on a certificate during the “Issued†stage?)
(What is a component of a one-time password (OTP) that is needed to guess future iterations of passwords?)
(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)
(Two people want to communicate through secure email. The person creating the email wants to ensure only their friend can decrypt the email. Which key should the person creating the email use to encrypt the message?)
(Which default port must be allowed by firewalls for the key exchange of the IPsec handshaking process to be successful?)
(Which symmetric encryption technique uses a 256-bit key size and a 128-bit block size?)