A) The agreed upon,trusted third party
B) A scenario where one user needs to validate the other's certificate
C) A construct of systems,personnel,applications,protocols,technologies and policies that work together to provide a certain level of protection
D) A scenario in which the certificate's issuer and subject fields hold the same information
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) A directory that calculates a message digest for the certificate
B) An entity that generates electronic credentials
C) A directory that requires a centralized infrastructure
D) A centralized directory in which the registered certificate is stored
Correct Answer
verified
Multiple Choice
A) The CA is implemented,maintained,and controlled by the company that implemented it.
B) The CA is already established and being used by many individuals and companies.
C) The CA provides more flexibility for companies.
D) It provides dedicated services,and possibly equipment,to an individual company.
Correct Answer
verified
Multiple Choice
A) Key recovery
B) Key escrow
C) Key archiving system
D) Private key protection
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) To eliminate certificate authorities
B) To provide identification to individuals and ensure availability
C) To provide a higher level of trust than can be obtained through other applications and protocols
D) To enable a centralized directory in which to store the registered certificate and distribute private keys to users requesting them
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) All keys are compromised.
B) Changed affiliation.
C) An extended vacation.
D) The certificate is no longer needed,but no reason exists to suspect that it has been compromised.
Correct Answer
verified
Multiple Choice
A) An entity that requires proof of identity from the individual requesting a certificate
B) An entity that generates a digitally signed identification certificate
C) A centralized directory in which the registered certificate is stored
D) An entity that generates electronic credentials
Correct Answer
verified
Multiple Choice
A) Cryptographic hardware is required for PKI construction.
B) The server that centrally stores the keys should not be available.
C) The private key must be computer generated and centrally stored.
D) Private keys must remain private.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Subordinate CAs and end users would be unaffected.
B) Subordinate CAs would also be compromised,but users would be unaffected.
C) Subordinate CAs and end users would be affected.
D) Only the root CA would be affected.
Correct Answer
verified
Short Answer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) It's a means of establishing the validity of an offer from a person,entity,web site or e-mail.
B) It's a centralized directory wherein registered keys are created and stored.
C) It's a means of establishing your credentials electronically when doing business or other transactions on the Web
D) It's an entity that generates electronic credentials and distributes them upon proving their identity sufficiently.
Correct Answer
verified
Multiple Choice
A) Version number,subject,public key,issuer,serial number,validity,certificate usage,signature algorithm,and extensions
B) Key encipherment,data encipherment,CRL sign,keycert sign,and nonrepudiation
C) End-entity,CA,cross-certification,and policy certification
D) CA identity,individual or party identification,company,and destination
Correct Answer
verified
Showing 1 - 20 of 50
Related Exams