Deck 6: Designing and Implementing a PKI
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 6: Designing and Implementing a PKI
1
The ____ is used to request certificates on behalf of a user and provides a signature.
A) enrollment agent
C) enrollment standard
B) certificate intermediary
D) enrollment GUI
A) enrollment agent
C) enrollment standard
B) certificate intermediary
D) enrollment GUI
A
2
The ____ is the first CA in the hierarchy.
A) basis CA
C) root CA
B) original CA
D) subordinate CA
A) basis CA
C) root CA
B) original CA
D) subordinate CA
C
3
Using ____, you can execute command-line commands from one server against a remote server.
A) WinRS
C) WinRM
B) WinSAT
D) WCEUtil
A) WinRS
C) WinRM
B) WinSAT
D) WCEUtil
C
4
When a ____ key pair is used, one key encrypts the data and the other key decrypts the data.
A) public/private
C) symmetric
B) private/private
D) bilateral
A) public/private
C) symmetric
B) private/private
D) bilateral
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A CA can be a company such as VeriSign that issues certificates for use on the Internet, or it can be a software component, such as Microsoft's Certification Authority, that issues certificates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Once the CA is created, it can be used to issue certificates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The same public key can decrypt information encrypted with the public key.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The first time a user encrypts data using EFS, a ____ key pair is generated.
A) private
C) symmetric
B) public/private
D) bifurcated
A) private
C) symmetric
B) public/private
D) bifurcated
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
When a public and private key are used for encryption, the process is called ____.
A) symmetric encryption
C) bilateral encryption
B) asymmetric encryption
D) dual encryption
A) symmetric encryption
C) bilateral encryption
B) asymmetric encryption
D) dual encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ involves the creation, issuing, managing, and revoking of certificates.
A) Certificate threat management
C) Public key management
B) Certificate life cycle management
D) Certificate Practice Policy
A) Certificate threat management
C) Public key management
B) Certificate life cycle management
D) Certificate Practice Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ allows an administrator to configure certificates to be issued to clients without them having to request the certificates.
A) Autoprovisioning
B) Autoenrollment
C) Autocertification
D) Autoconfiguration
A) Autoprovisioning
B) Autoenrollment
C) Autocertification
D) Autoconfiguration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
An established public CA will have a root certificate in the ____.
A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.
A) smart card
C) trusted computing base
B) token
D) trusted computing module
A) smart card
C) trusted computing base
B) token
D) trusted computing module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Revoked certificates are published by the CA via a(n) ____ using an X.509 version 2 certificate.
A) invalid certificates list (ICL)
C) certificate practice statement (CPS)
B) certificate revocation list (CRL)
D) certificate life cycle list (CLCL)
A) invalid certificates list (ICL)
C) certificate practice statement (CPS)
B) certificate revocation list (CRL)
D) certificate life cycle list (CLCL)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.
A) Public-key snap-in
C) Encryption snap-in
B) Computer Management snap-in
D) Certificates snap-in
A) Public-key snap-in
C) Encryption snap-in
B) Computer Management snap-in
D) Certificates snap-in
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ is used to issue and manage certificates.
A) public key registry
C) public key store
B) public key cryptography
D) public key infrastructure
A) public key registry
C) public key store
B) public key cryptography
D) public key infrastructure
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A PKI may appear complex on the surface but is actually rather simple.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ____ is a complete listing of all certificates revoked by the CA.
A) new CRL
C) alpha CRL
B) delta CRL
D) revocation CRL
A) new CRL
C) alpha CRL
B) delta CRL
D) revocation CRL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A ____ is a number created by performing a hashing algorithm on data.
A) signature
C) cipher
B) key
D) hash
A) signature
C) cipher
B) key
D) hash
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Explain how you can view certificates in the Trusted Root Certification Authority.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ___________________ lists only the changes since the last CRL publication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Explain automatic certificate enrollment.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The Network Device Enrollment service uses a(n) ____ to accept the registration requests.
A) certification authority
C) enrollment authority
B) registration authority
D) requirements authority
A) certification authority
C) enrollment authority
B) registration authority
D) requirements authority
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ___________________ provides authentication, integrity, and non-repudiation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____ add advanced cryptographic settings to the certificate, and can be used with Windows Vista and later clients.
A) V1 templates
C) V3 templates
B) V2 templates
D) V4 templates
A) V1 templates
C) V3 templates
B) V2 templates
D) V4 templates
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
AD CS publishes the full CRL once a ____ by default.
A) day
C) month
B) week
D) year
A) day
C) month
B) week
D) year
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
List two purposes for which certificates are used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
List the four steps required to complete the configuration of the online responder.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Users in the ___________________ role are granted Backup File and Directories and Restore File and Directories permissions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Users in the ____ role are granted the Manage Auditing and Security Log permissions.
A) Administrator
C) Auditor
B) Approver
D) Validator
A) Administrator
C) Auditor
B) Approver
D) Validator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Explain how to deploy trusted root certificates via group policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
AD CS publishes a delta CRL once a ____ by default.
A) day
C) month
B) week
D) year
A) day
C) month
B) week
D) year
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Explain how the online responder service is configured.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
You can use the ____ to view and manage all of the certificate stores used by the computer, users, or services on a computer.
A) Policies MMC
C) System MMC
B) Computer Management MMC
D) Certificates MMC
A) Policies MMC
C) System MMC
B) Computer Management MMC
D) Certificates MMC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
List and describe two permissions that can be granted to enterprise admins.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
List and describe two AD CS role services.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Discuss how certificates issued to network devices can be used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe restricted enrollment agents.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck