Exam 6: Public Key Infrastructure
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
A(n)_______________ certificate is used when independent CAs establish peer-to-peer trust relationships.
Free
(Short Answer)
4.7/5
(29)
Correct Answer:
cross-certification
A(n)_______________ is a construct of systems,personnel,applications,protocols,technologies,and policies that work together to provide a certain level of protection.
Free
(Short Answer)
4.7/5
(33)
Correct Answer:
trust domain
If the root CA's private key were compromised,what would happen?
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
C
_______________ is the standard used for creating and formatting certificates.
(Short Answer)
4.9/5
(28)
The term used to describe a centralized directory that can be accessed by a subset of individuals is _______________
(Short Answer)
4.9/5
(28)
Which of the following reasons would be appropriate for a certificate suspension rather than revocation?
(Multiple Choice)
4.8/5
(30)
When a person loses a laptop that had a private key stored on it,that person should request a revocation of the related certificate.
(True/False)
4.9/5
(40)
The list of serial numbers of certificates that have been revoked is called the _______________.
(Short Answer)
4.7/5
(42)
What are centralized and decentralized infrastructures? Explain why you might choose one over the other.
(Essay)
4.9/5
(41)
_______________ binds a public key to a known user through a trusted intermediary,typically a certificate authority.
(Short Answer)
4.8/5
(35)
A process of giving keys to a third party so that they can decrypt and read sensitive information is
(Multiple Choice)
4.9/5
(29)
A digital certificate binds an individual's identity to a public key.
(True/False)
4.7/5
(34)
Which of the following is a critical concept common to all PKIs?
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)