Exam 3: Essential Public Key Infrastructure

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Digital signature provides not only data origin authentication but also data ____.

(Multiple Choice)
4.8/5
(39)

Briefly describe the main characteristics of an authority revocation list.

(Essay)
4.8/5
(41)

A CA certificate signed by another CA's private key is referred as a(n) ____ .

(Multiple Choice)
4.9/5
(39)

The ____ is intended for displaying information to a replying party when a certificate is used.

(Multiple Choice)
4.8/5
(34)

A(n) ____ creates key pairs and also implements backup and recovery of private keys.

(Multiple Choice)
4.9/5
(36)

____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.

(Multiple Choice)
4.7/5
(29)

The ____ phase ensures that the private key and public key certificates created are used correctly and efficiently in the PKI community.

(Multiple Choice)
4.7/5
(34)

If a CA creates a certificate that is signed by its own private key, it is commonly known as a(n) ____.

(Multiple Choice)
4.9/5
(38)

____ authentication means that only a single assurance method is used for authentication.

(Multiple Choice)
5.0/5
(39)

The fundamental premise of public key cryptography is to provide secure communication between strangers.

(True/False)
4.8/5
(40)

Key and certificate life cycle management must be in place to enable public key cryptography to be used correctly.

(True/False)
4.8/5
(41)

What are the general requirements a security infrastructure must satisfy?

(Essay)
4.8/5
(36)

____ is a publishing method in which revocation information is updated and posted for entities in the PKI community to obtain.

(Multiple Choice)
5.0/5
(36)

____________________ is the assurance that an entity is who it claims to be.

(Short Answer)
4.8/5
(27)

Alice is sending a message to Bob. How can Alice ensure data integrity?

(Essay)
4.9/5
(39)

What are the steps required to use a CRL DP?

(Essay)
4.9/5
(40)

What are the three most common methods for implementing Delta CRL?

(Essay)
4.9/5
(36)

What are the four assurance methods? Give examples of each.

(Essay)
4.7/5
(35)

The _________________________ is the centerpiece and the most critical component of a PKI.

(Short Answer)
4.8/5
(34)

The PKIX Working Group was established in the fall of 1995 under the standard organization ____.

(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)