Exam 15: Cryptographic Key Management and Distribution

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ is an integer value unique within the issuing CA that is unambiguously associated with this certificate.

Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
Verified

C

X.509 is an important standard because the certificate structure and authentication protocols defined in X.509 are used in a variety of contexts.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

True

A _________ is any method for storing and retrieving PKI-related information, such as public key certificates and CRLs.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

repository

X.509 dictates the use of a specific digital signature algorithm and a specific hash function.

(True/False)
4.7/5
(30)

If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and B.A _________ center is responsible for distributing keys to pairs of users as needed.

(Short Answer)
4.9/5
(28)

the secure use of cryptographic key algorithms depends on the protection of the cryptographic keys.

(True/False)
4.8/5
(33)

A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.

(Short Answer)
4.8/5
(37)

A key translation center generates and distributes session keys.

(True/False)
4.8/5
(38)

the _________ can be an end user; a device such as a router or server; a process; or any item that can be identified in the subject name of a public key certificate.

(Multiple Choice)
4.9/5
(44)

A certificate consists of a public key, an identifier of the key owner, and the whole block signed by a trusted third party.

(True/False)
4.9/5
(32)

Several techniques have been proposed for the distribution of public keys.the proposals can be grouped into the following four general schemes: public announcement, publicly available directory, public-key certificates, and ____________.

(Short Answer)
4.8/5
(38)

the heart of the X.509 scheme is the __________ certificate associate with each user.

(Short Answer)
4.9/5
(35)

__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.

(Multiple Choice)
4.9/5
(33)

__________ refers to the means of delivering a key to two parties who wish to exchange data, without allowing others to see the key.

(Multiple Choice)
5.0/5
(36)

If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.

(Multiple Choice)
4.7/5
(27)

Because certificates are forgeable they cannot be placed in a directory without the need for the directory to make special efforts to protect them.

(True/False)
4.9/5
(37)

the principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.

(Multiple Choice)
4.9/5
(26)

A __________ is a server or distributed set of servers that maintains a database of information about users.

(Multiple Choice)
4.8/5
(34)

One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.

(Multiple Choice)
4.7/5
(34)

the strength of any cryptographic system rests with the ___________ .

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)