Exam 3: Essential Public Key Infrastructure
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
Any method of publishing a certificate without a network-access protocol can be classified as ____ sharing.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
A(n) ____________________ provides a common trusted source for anyone in the PKI community to retrieve certificates.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
certificate repository
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.9/5
(38)
Correct Answer:
An X.509 v3 certificate ____ extension is a bit string used to indicate the usage supported by the public key of this certificate.
(Multiple Choice)
4.8/5
(28)
The foundation of PKI was established approximately 30 years ago with the invention of private key cryptography.
(True/False)
4.9/5
(41)
Briefly explain the certificate expiration task of the key and certificate life cycle management cancellation phase.
(Essay)
4.7/5
(33)
____ is the process in which the identity of an end entity is established and verified.
(Multiple Choice)
4.9/5
(31)
The initial creation of the public and private key pair is usually performed in the certificate authority's system.
(True/False)
4.8/5
(32)
____________________ occurs between the time of learning that the certificate should be revoked and the time that the revocation information is actually posted for the relying parties.
(Short Answer)
4.9/5
(31)
____________________ is the assurance of data privacy and is usually provided by symmetric cryptography using algorithms such as AES and 3DES.
(Short Answer)
4.9/5
(35)
____ is a service that provides the assurance that an entity remains honest about its actions.
(Multiple Choice)
4.7/5
(37)
The technical term "____" refers to communications that occur outside of previously established communications method or channel.
(Multiple Choice)
4.7/5
(35)
The core services provided by PKI are ____ , integrity and confidentiality.
(Multiple Choice)
4.8/5
(36)
A(n) ____ creates an immediate layer of abstraction for storing revocation information in a more flexible way.
(Multiple Choice)
4.9/5
(40)
What are the most common approaches to provide PKI client functionalities?
(Essay)
4.9/5
(42)
The most common method of entity authentication is a prompting for a user ID and password.
(True/False)
4.9/5
(39)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)