Exam 3: Essential Public Key Infrastructure

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Any method of publishing a certificate without a network-access protocol can be classified as ____ sharing.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

D

A(n) ____________________ provides a common trusted source for anyone in the PKI community to retrieve certificates.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

certificate repository

Match each item with a statement below:
a list of certificates that have been revoked and should not be used
CA domain
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Key history
provides identification of the specific entity involved
Entity authentication
Correct Answer:
Verified
Premises:
Responses:
a list of certificates that have been revoked and should not be used
CA domain
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Key history
provides identification of the specific entity involved
Entity authentication
the community served by a CA
Infrastructure
a process that reliably and securely stores keying material even though the certificate is expired
Certificate repository
the underlying foundation or basic framework for a large environment
Complete CRL
the simplest form of CRL
S/MIME
publishes certificates so that users can find them
CRL
provides a consistent way to send and receive secure MIME data in e-mail
CPS pointer
Free
(Matching)
4.9/5
(38)
Correct Answer:
Verified

An X.509 v3 certificate ____ extension is a bit string used to indicate the usage supported by the public key of this certificate.

(Multiple Choice)
4.8/5
(28)

The foundation of PKI was established approximately 30 years ago with the invention of private key cryptography.

(True/False)
4.9/5
(41)

Briefly explain the certificate expiration task of the key and certificate life cycle management cancellation phase.

(Essay)
4.7/5
(33)

____ is the process in which the identity of an end entity is established and verified.

(Multiple Choice)
4.9/5
(31)

CRL distribution point (CRL DP) is also called ____.

(Multiple Choice)
4.8/5
(33)

The initial creation of the public and private key pair is usually performed in the certificate authority's system.

(True/False)
4.8/5
(32)

____________________ occurs between the time of learning that the certificate should be revoked and the time that the revocation information is actually posted for the relying parties.

(Short Answer)
4.9/5
(31)

____________________ is the assurance of data privacy and is usually provided by symmetric cryptography using algorithms such as AES and 3DES.

(Short Answer)
4.9/5
(35)

Explain the main characteristics of indirect CRLs.

(Essay)
4.9/5
(39)

____ is a service that provides the assurance that an entity remains honest about its actions.

(Multiple Choice)
4.7/5
(37)

What are some of the common tasks of a registration authority?

(Essay)
4.8/5
(37)

The technical term "____" refers to communications that occur outside of previously established communications method or channel.

(Multiple Choice)
4.7/5
(35)

____ is the most common method of certificate revocation.

(Multiple Choice)
4.7/5
(36)

The core services provided by PKI are ____ , integrity and confidentiality.

(Multiple Choice)
4.8/5
(36)

A(n) ____ creates an immediate layer of abstraction for storing revocation information in a more flexible way.

(Multiple Choice)
4.9/5
(40)

What are the most common approaches to provide PKI client functionalities?

(Essay)
4.9/5
(42)

The most common method of entity authentication is a prompting for a user ID and password.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)