Which of the following will Ann need to use to verify the validity’s of Joe’s certificate?
Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to
verify the validity’s of Joe’s certificate? (Select TWO).
Which of the following would the user need to perform?
A user was reissued a smart card after the previous smart card had expired. The user is able to log into
the domain but is now unable to send digitally signed or encrypted email. Which of the following would
the user need to perform?
Which of the following could cause a browser to display the message below?
Which of the following could cause a browser to display the message below?
“The security certificate presented by this website was issued for a different website’s address.”
Certificates are used for: (Select TWO).
Certificates are used for: (Select TWO).
Which of the following could be causing the problem?
Some customers have reported receiving an untrusted certificate warning when visiting the company’s
website. The administrator ensures that the certificate is not expired and that customers have trusted the
original issuer of the certificate. Which of the following could be causing the problem?
which of the following?
Digital certificates can be used to ensure which of the following? (Select TWO).
Which of the following will occur if the certificate is allowed to expire?
A certificate used on an ecommerce web server is about to expire. Which of the following will occur if the
certificate is allowed to expire?
Which of the following files should be copied from srv4 to accomplish this?
An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate
*.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files
should be copied from srv4 to accomplish this?
Which of the following aspects of PKI BEST ensures the identity of the sender?
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the
message. Which of the following aspects of PKI BEST ensures the identity of the sender?
Which of the following would prevent her from denying accountability?
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an
unintended group. Which of the following would prevent her from denying accountability?