0
0
Cybersecurityknowledge~5 mins

Public Key Infrastructure (PKI) in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is Public Key Infrastructure (PKI)?
PKI is a system that helps secure communication by using pairs of keys: a public key and a private key. It manages digital certificates and encryption to verify identities and protect data.
Click to reveal answer
beginner
What are the two types of keys used in PKI?
PKI uses a public key, which can be shared openly, and a private key, which is kept secret. Together, they enable secure data exchange and digital signatures.
Click to reveal answer
beginner
What is a digital certificate in PKI?
A digital certificate is like an electronic ID card. It proves that a public key belongs to a specific person or organization, issued by a trusted authority called a Certificate Authority (CA).
Click to reveal answer
intermediate
What role does a Certificate Authority (CA) play in PKI?
A CA is a trusted organization that issues digital certificates. It verifies identities and ensures that public keys are linked to the right owners, helping others trust the communication.
Click to reveal answer
intermediate
How does PKI help in secure communication?
PKI allows people to encrypt messages with a public key so only the private key owner can read them. It also supports digital signatures to confirm who sent a message and that it wasn’t changed.
Click to reveal answer
What does PKI primarily manage?
ADigital certificates and encryption keys
BUser passwords
CFirewall settings
DNetwork traffic
Which key in PKI should be kept secret?
APublic key
BNeither key
CBoth keys
DPrivate key
Who issues digital certificates in PKI?
AInternet Service Provider
BCertificate Authority
CEnd user
DFirewall
What does a digital signature prove?
AThe message is public
BThe message is encrypted
CThe sender’s identity and message integrity
DThe message is deleted
Which of these is NOT a function of PKI?
AManaging user passwords
BEncrypting data
CIssuing digital certificates
DVerifying identities
Explain how PKI uses public and private keys to secure communication.
Think about how one key locks the message and the other unlocks it.
You got /5 concepts.
    Describe the role of a Certificate Authority in the PKI system.
    Consider who acts like a trusted referee in the system.
    You got /4 concepts.