Exam 6: Public Key Infrastructure
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
A registration authority is the PKI component that certifies an individual's identity and creates electronic documents indicating that individuals are who they say they are.
(True/False)
4.8/5
(37)
PKI can be used as a measure to trust individuals we do not know.
(True/False)
4.7/5
(34)
Explain what certificate revocation is and give examples of when it might be necessary.
(Essay)
4.9/5
(33)
The difference between centralized and decentralized infrastructures is
(Multiple Choice)
4.7/5
(28)
A certificate authority is the PKI component that accepts a request for a digital certificate and performs the necessary steps of registering and authenticating the person requesting the certificate.
(True/False)
5.0/5
(29)
_______________ is a trusted authority that certifies individuals' identities and creates electronic documents indicating that individuals are who they say they are.
(Short Answer)
4.7/5
(23)
All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT:
(Multiple Choice)
4.7/5
(37)
_______________ is the process of giving the keys to a third party so that they can decrypt and read sensitive information if the need arises.
(Short Answer)
4.9/5
(41)
"Digital certificate" and "private key" are two different terms for the same thing.
(True/False)
4.8/5
(23)
Requiring two individuals to recover a lost key together is called
(Multiple Choice)
4.8/5
(25)
The X.509 standard outlines the necessary fields of a certificate and the possible values that can be in each field.
(True/False)
4.7/5
(42)
A(n)_______________ binds a user's identity to a public key,and contains all the information the receiver needs to be assured of the identity of the public key owner.
(Short Answer)
4.8/5
(33)
The peer-to-peer trust model is well suited for large environments and avoids complex setups.
(True/False)
4.8/5
(34)
Certificate expansions allow for further information to be inserted within the certificate to add functionality to a PKI implementation.
Extensions,not expansions.
(True/False)
4.9/5
(39)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)