Exam 6: Public Key Infrastructure

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A registration authority is the PKI component that certifies an individual's identity and creates electronic documents indicating that individuals are who they say they are.

(True/False)
4.8/5
(37)

PKI can be used as a measure to trust individuals we do not know.

(True/False)
4.7/5
(34)

Explain what certificate revocation is and give examples of when it might be necessary.

(Essay)
4.9/5
(33)

What is a registration authority?

(Multiple Choice)
4.9/5
(31)

Outsourced CAs are different from Public CAs in what way?

(Multiple Choice)
4.8/5
(26)

List the steps for validating a certificate

(Essay)
4.8/5
(35)

The difference between centralized and decentralized infrastructures is

(Multiple Choice)
4.7/5
(28)

One of the steps necessary to validate a certificate is to

(Multiple Choice)
4.9/5
(30)

A certificate authority is the PKI component that accepts a request for a digital certificate and performs the necessary steps of registering and authenticating the person requesting the certificate.

(True/False)
5.0/5
(29)

_______________ is a trusted authority that certifies individuals' identities and creates electronic documents indicating that individuals are who they say they are.

(Short Answer)
4.7/5
(23)

All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT:

(Multiple Choice)
4.7/5
(37)

_______________ is the process of giving the keys to a third party so that they can decrypt and read sensitive information if the need arises.

(Short Answer)
4.9/5
(41)

"Digital certificate" and "private key" are two different terms for the same thing.

(True/False)
4.8/5
(23)

Requiring two individuals to recover a lost key together is called

(Multiple Choice)
4.8/5
(25)

An in-house certificate authority is

(Multiple Choice)
4.9/5
(34)

The X.509 standard outlines the necessary fields of a certificate and the possible values that can be in each field.

(True/False)
4.7/5
(42)

A(n)_______________ binds a user's identity to a public key,and contains all the information the receiver needs to be assured of the identity of the public key owner.

(Short Answer)
4.8/5
(33)

What are the three types of trust models?

(Essay)
4.7/5
(37)

The peer-to-peer trust model is well suited for large environments and avoids complex setups.

(True/False)
4.8/5
(34)

Certificate expansions allow for further information to be inserted within the certificate to add functionality to a PKI implementation. Extensions,not expansions.

(True/False)
4.9/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)