Exam 6: Public Key Infrastructure

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)_______________ certificate is used when independent CAs establish peer-to-peer trust relationships.

Free
(Short Answer)
4.7/5
(29)
Correct Answer:
Verified

cross-certification

A(n)_______________ is a construct of systems,personnel,applications,protocols,technologies,and policies that work together to provide a certain level of protection.

Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Verified

trust domain

If the root CA's private key were compromised,what would happen?

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

C

Why construct and implement a PKI?

(Multiple Choice)
4.9/5
(39)

_______________ is the standard used for creating and formatting certificates.

(Short Answer)
4.9/5
(28)

The term used to describe a centralized directory that can be accessed by a subset of individuals is _______________

(Short Answer)
4.9/5
(28)

What are the different fields within a digital certificate?

(Multiple Choice)
4.8/5
(37)

Which of the following reasons would be appropriate for a certificate suspension rather than revocation?

(Multiple Choice)
4.8/5
(30)

What is a digital certificate?

(Multiple Choice)
4.7/5
(30)

A trust domain is defined as

(Multiple Choice)
4.9/5
(30)

How is an outsourced CA different from a public CA?

(Multiple Choice)
4.8/5
(38)

When a person loses a laptop that had a private key stored on it,that person should request a revocation of the related certificate.

(True/False)
4.9/5
(40)

The list of serial numbers of certificates that have been revoked is called the _______________.

(Short Answer)
4.7/5
(42)

What is a certificate authority?

(Multiple Choice)
4.8/5
(30)

What are centralized and decentralized infrastructures? Explain why you might choose one over the other.

(Essay)
4.9/5
(41)

_______________ binds a public key to a known user through a trusted intermediary,typically a certificate authority.

(Short Answer)
4.8/5
(35)

A process of giving keys to a third party so that they can decrypt and read sensitive information is

(Multiple Choice)
4.9/5
(29)

What is a certificate repository?

(Multiple Choice)
4.9/5
(29)

A digital certificate binds an individual's identity to a public key.

(True/False)
4.7/5
(34)

Which of the following is a critical concept common to all PKIs?

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)