Filters
Question type

Study Flashcards

A trust domain is defined as


A) The agreed upon,trusted third party
B) A scenario where one user needs to validate the other's certificate
C) A construct of systems,personnel,applications,protocols,technologies and policies that work together to provide a certain level of protection
D) A scenario in which the certificate's issuer and subject fields hold the same information

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A(n)_______________ certificate is used when independent CAs establish peer-to-peer trust relationships.

Correct Answer

verifed

verified

cross-certification

What is a certificate repository?


A) A directory that calculates a message digest for the certificate
B) An entity that generates electronic credentials
C) A directory that requires a centralized infrastructure
D) A centralized directory in which the registered certificate is stored

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

How is an outsourced CA different from a public CA?


A) The CA is implemented,maintained,and controlled by the company that implemented it.
B) The CA is already established and being used by many individuals and companies.
C) The CA provides more flexibility for companies.
D) It provides dedicated services,and possibly equipment,to an individual company.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A process of giving keys to a third party so that they can decrypt and read sensitive information is


A) Key recovery
B) Key escrow
C) Key archiving system
D) Private key protection

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

_______________ is the standard used for creating and formatting certificates.

Correct Answer

verifed

verified

A digital certificate binds an individual's identity to a public key.

A) True
B) False

Correct Answer

verifed

verified

The list of serial numbers of certificates that have been revoked is called the _______________.

Correct Answer

verifed

verified

certificat...

View Answer

Why construct and implement a PKI?


A) To eliminate certificate authorities
B) To provide identification to individuals and ensure availability
C) To provide a higher level of trust than can be obtained through other applications and protocols
D) To enable a centralized directory in which to store the registered certificate and distribute private keys to users requesting them

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

_______________ binds a public key to a known user through a trusted intermediary,typically a certificate authority.

Correct Answer

verifed

verified

Public key...

View Answer

Which of the following reasons would be appropriate for a certificate suspension rather than revocation?


A) All keys are compromised.
B) Changed affiliation.
C) An extended vacation.
D) The certificate is no longer needed,but no reason exists to suspect that it has been compromised.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a certificate authority?


A) An entity that requires proof of identity from the individual requesting a certificate
B) An entity that generates a digitally signed identification certificate
C) A centralized directory in which the registered certificate is stored
D) An entity that generates electronic credentials

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a critical concept common to all PKIs?


A) Cryptographic hardware is required for PKI construction.
B) The server that centrally stores the keys should not be available.
C) The private key must be computer generated and centrally stored.
D) Private keys must remain private.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

When a person loses a laptop that had a private key stored on it,that person should request a revocation of the related certificate.

A) True
B) False

Correct Answer

verifed

verified

If the root CA's private key were compromised,what would happen?


A) Subordinate CAs and end users would be unaffected.
B) Subordinate CAs would also be compromised,but users would be unaffected.
C) Subordinate CAs and end users would be affected.
D) Only the root CA would be affected.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

C

A(n)_______________ is a construct of systems,personnel,applications,protocols,technologies,and policies that work together to provide a certain level of protection.

Correct Answer

verifed

verified

trust domain

What are centralized and decentralized infrastructures? Explain why you might choose one over the other.

Correct Answer

verifed

verified

In a decentralized approach,software on ...

View Answer

The term used to describe a centralized directory that can be accessed by a subset of individuals is _______________

Correct Answer

verifed

verified

certificat...

View Answer

What is a digital certificate?


A) It's a means of establishing the validity of an offer from a person,entity,web site or e-mail.
B) It's a centralized directory wherein registered keys are created and stored.
C) It's a means of establishing your credentials electronically when doing business or other transactions on the Web
D) It's an entity that generates electronic credentials and distributes them upon proving their identity sufficiently.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

What are the different fields within a digital certificate?


A) Version number,subject,public key,issuer,serial number,validity,certificate usage,signature algorithm,and extensions
B) Key encipherment,data encipherment,CRL sign,keycert sign,and nonrepudiation
C) End-entity,CA,cross-certification,and policy certification
D) CA identity,individual or party identification,company,and destination

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer