Exam 3: Essential Public Key Infrastructure
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
Digital signature provides not only data origin authentication but also data ____.
(Multiple Choice)
4.8/5
(39)
Briefly describe the main characteristics of an authority revocation list.
(Essay)
4.8/5
(41)
A CA certificate signed by another CA's private key is referred as a(n) ____ .
(Multiple Choice)
4.9/5
(39)
The ____ is intended for displaying information to a replying party when a certificate is used.
(Multiple Choice)
4.8/5
(34)
A(n) ____ creates key pairs and also implements backup and recovery of private keys.
(Multiple Choice)
4.9/5
(36)
____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.
(Multiple Choice)
4.7/5
(29)
The ____ phase ensures that the private key and public key certificates created are used correctly and efficiently in the PKI community.
(Multiple Choice)
4.7/5
(34)
If a CA creates a certificate that is signed by its own private key, it is commonly known as a(n) ____.
(Multiple Choice)
4.9/5
(38)
____ authentication means that only a single assurance method is used for authentication.
(Multiple Choice)
5.0/5
(39)
The fundamental premise of public key cryptography is to provide secure communication between strangers.
(True/False)
4.8/5
(40)
Key and certificate life cycle management must be in place to enable public key cryptography to be used correctly.
(True/False)
4.8/5
(41)
What are the general requirements a security infrastructure must satisfy?
(Essay)
4.8/5
(36)
____ is a publishing method in which revocation information is updated and posted for entities in the PKI community to obtain.
(Multiple Choice)
5.0/5
(36)
____________________ is the assurance that an entity is who it claims to be.
(Short Answer)
4.8/5
(27)
Alice is sending a message to Bob. How can Alice ensure data integrity?
(Essay)
4.9/5
(39)
The _________________________ is the centerpiece and the most critical component of a PKI.
(Short Answer)
4.8/5
(34)
The PKIX Working Group was established in the fall of 1995 under the standard organization ____.
(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)