Exam 14: Key Management and Distribution

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The __________ is the issuer of certificates and certificate revocation lists and may also support a variety of administrative functions.

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

C

__________ is an integer value unique within the issuing CA that is unambiguously associated with this certificate.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

A _________ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

repository

A __________ consists of a public key,an identifier of the key owner,and the whole block signed by a trusted third party and can be used by participants to exchange keys without contacting a public key authority in a way that is as reliable as if the keys were obtained directly from a public key authority.

(Essay)
4.8/5
(25)

Typically the session key is used for the duration of a logical connection,such as a frame relay connection or transport connection,and then it is permanently stored.

(True/False)
4.8/5
(34)

Key distribution often involves the use of _________ which are generated and distributed for temporary use between two parties.

(Multiple Choice)
4.8/5
(37)

Several techniques have been proposed for the distribution of public keys.The proposals can be grouped into the following four general schemes: public announcement,publicly available directory,public-key certificates,and ____________.

(Essay)
4.9/5
(28)

_________ implementations make use of X.509 certificates.

(Multiple Choice)
4.9/5
(38)

__________ key encryption schemes are secure if the public key is authenticated.

(Multiple Choice)
4.8/5
(34)

A unique identifier for a transaction is a __________ and this identifier may be a timestamp,a counter or a random number,with the minimum requirement being that it differs with each request.

(Essay)
4.8/5
(38)

A _________ is defined as the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.

(Essay)
5.0/5
(39)

The distribution of session keys delays the start of any exchange and places a burden on network capacity.

(True/False)
4.8/5
(32)

Because certificates are forgeable they cannot be placed in a directory without the need for the directory to make special efforts to protect them.

(True/False)
4.7/5
(30)

One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.

(Multiple Choice)
4.9/5
(28)

__________ is the process whereby a user first makes itself known to a certification authority prior to that certification authority issuing a certificate for that user.

(Essay)
4.8/5
(29)

For link encryption manual delivery is awkward.

(True/False)
4.8/5
(35)

__________ certificates are used in most network security applications including IP security,transport layer security and S/MIME.

(Essay)
4.9/5
(41)

X.509 defines the format for private-key certificates.

(True/False)
4.8/5
(39)

Used in a variety of applications,__________ defines the format for public-key certificates.

(Essay)
4.9/5
(38)

If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)