Filters
Question type

Study Flashcards

____ can verify the authenticity of the sender and enforce nonrepudiation to prove that the sender is who he claims to be and cannot deny sending it.


A) Symmetric encryption
B) Private encryption
C) Asymmetric encryption
D) Elliptic encryption

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

C

List the four stages of a certificate life cycle.

Correct Answer

verifed

verified

Creation
S...

View Answer

List two requirements for verification of an EV SSL.

Correct Answer

verifed

verified

The CA must pass an independent audit ve...

View Answer

A class 2 certificate is known as a ____ certificate.


A) signing digital
B) server digital
C) personal digital
D) code-signing

E) None of the above
F) All of the above

Correct Answer

verifed

verified

TLS is an extension of ____.


A) Telnet
B) HTTP
C) SSL
D) FTP

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

____________________ may be defined as confidence in or reliance on another person or entity.

Correct Answer

verifed

verified

Digital certificates cannot be used to identify objects other than users.

A) True
B) False

Correct Answer

verifed

verified

Explain the difference between key revocation versus key suspension.

Correct Answer

verifed

verified

The revocation of a key is permanent; key suspension is for a set period of time. For example, if an employee is on an extended medical leave, it may be necessary to suspend the use of her key for security reasons. A suspended key can be later reinstated.

Identify the general duties of an RA.

Correct Answer

verifed

verified

Receive, authenticate, and process certificate revocation requests. Identify and authenticate subscribers. Obtain a public key from the subscriber. Verify that the subscriber possesses the asymmetric private key corresponding to the public key submitted for certification.

A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.

Correct Answer

verifed

verified

Cryptography cannot protect data as it is being transported across a network.

A) True
B) False

Correct Answer

verifed

verified

At the ____ stage of the certificate life cycle, the certificate is no longer valid.


A) creation
B) suspension
C) revocation
D) expiration

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Match each term with the correct statement below

Premises
A published set of rules that govern the operation of a PKI
A technology used to associate a user's identity to a public key that has been "digitally signed" by a trusted third party
A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate
Encrypts only the data portion (payload) of each packet yet leaves the header unencrypted
A set of protocols developed to support the secure exchange of packets
Encrypts both the header and the data portion
A numbered set of PKI standards that have been defined by the RSA Corporation
Describes in detail how the CA uses and manages certificates
Responses
Transport mode
CP
IPsec
Digital certificate
CPS
PKCS
SSH
Tunnel mode
CR

Correct Answer

Transport mode
CP
IPsec
Digital certificate
CPS
PKCS
SSH
Tunnel mode
CR

List the three PKI trust models that use a CA.

Correct Answer

verifed

verified

The models are the hierarchica...

View Answer

Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.

Correct Answer

verifed

verified

List three pieces of information a digital certificate typically contains.

Correct Answer

verifed

verified

Owner's name or alias
Owner's public key...

View Answer

____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.


A) Blocking
B) Hashing
C) Encrypting
D) Cloning

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

____ allows clients and the server to negotiate independently encryption, authentication, and digital signature methods, in any combination, in both directions.


A) SFTP
B) SHTTP
C) HTTPS
D) Telnets

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

In SSH, the ____________________ command allows a user to log on to a remote computer.

Correct Answer

verifed

verified

List and describe the entities for which IPsec is transparent.

Correct Answer

verifed

verified

Applications. Programs do not have to be...

View Answer

Showing 1 - 20 of 42

Related Exams

Show Answer