Deck 6: Designing and Implementing a PKI

Full screen (f)
exit full mode
Question
The ____ is used to request certificates on behalf of a user and provides a signature.

A) enrollment agent
C) enrollment standard
B) certificate intermediary
D) enrollment GUI
Use Space or
up arrow
down arrow
to flip the card.
Question
The ____ is the first CA in the hierarchy.

A) basis CA
C) root CA
B) original CA
D) subordinate CA
Question
Using ____, you can execute command-line commands from one server against a remote server.

A) WinRS
C) WinRM
B) WinSAT
D) WCEUtil
Question
When a ____ key pair is used, one key encrypts the data and the other key decrypts the data.

A) public/private
C) symmetric
B) private/private
D) bilateral
Question
A CA can be a company such as VeriSign that issues certificates for use on the Internet, or it can be a software component, such as Microsoft's Certification Authority, that issues certificates.
Question
Once the CA is created, it can be used to issue certificates.
Question
The same public key can decrypt information encrypted with the public key.
Question
The first time a user encrypts data using EFS, a ____ key pair is generated.

A) private
C) symmetric
B) public/private
D) bifurcated
Question
When a public and private key are used for encryption, the process is called ____.

A) symmetric encryption
C) bilateral encryption
B) asymmetric encryption
D) dual encryption
Question
____ involves the creation, issuing, managing, and revoking of certificates.

A) Certificate threat management
C) Public key management
B) Certificate life cycle management
D) Certificate Practice Policy
Question
____ allows an administrator to configure certificates to be issued to clients without them having to request the certificates.

A) Autoprovisioning
B) Autoenrollment
C) Autocertification
D) Autoconfiguration
Question
An established public CA will have a root certificate in the ____.

A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
Question
A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.

A) smart card
C) trusted computing base
B) token
D) trusted computing module
Question
Revoked certificates are published by the CA via a(n) ____ using an X.509 version 2 certificate.

A) invalid certificates list (ICL)
C) certificate practice statement (CPS)
B) certificate revocation list (CRL)
D) certificate life cycle list (CLCL)
Question
The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.

A) Public-key snap-in
C) Encryption snap-in
B) Computer Management snap-in
D) Certificates snap-in
Question
A ____ is used to issue and manage certificates.

A) public key registry
C) public key store
B) public key cryptography
D) public key infrastructure
Question
A PKI may appear complex on the surface but is actually rather simple.
Question
After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
Question
A(n) ____ is a complete listing of all certificates revoked by the CA.

A) new CRL
C) alpha CRL
B) delta CRL
D) revocation CRL
Question
A ____ is a number created by performing a hashing algorithm on data.

A) signature
C) cipher
B) key
D) hash
Question
Explain how you can view certificates in the Trusted Root Certification Authority.
Question
A(n) ___________________ lists only the changes since the last CRL publication.
Question
Explain automatic certificate enrollment.
Question
The Network Device Enrollment service uses a(n) ____ to accept the registration requests.

A) certification authority
C) enrollment authority
B) registration authority
D) requirements authority
Question
A(n) ___________________ provides authentication, integrity, and non-repudiation.
Question
____ add advanced cryptographic settings to the certificate, and can be used with Windows Vista and later clients.

A) V1 templates
C) V3 templates
B) V2 templates
D) V4 templates
Question
AD CS publishes the full CRL once a ____ by default.

A) day
C) month
B) week
D) year
Question
List two purposes for which certificates are used.
Question
Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
Question
List the four steps required to complete the configuration of the online responder.
Question
Users in the ___________________ role are granted Backup File and Directories and Restore File and Directories permissions.
Question
One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.
Question
Users in the ____ role are granted the Manage Auditing and Security Log permissions.

A) Administrator
C) Auditor
B) Approver
D) Validator
Question
Explain how to deploy trusted root certificates via group policy.
Question
AD CS publishes a delta CRL once a ____ by default.

A) day
C) month
B) week
D) year
Question
Explain how the online responder service is configured.
Question
You can use the ____ to view and manage all of the certificate stores used by the computer, users, or services on a computer.

A) Policies MMC
C) System MMC
B) Computer Management MMC
D) Certificates MMC
Question
List and describe two permissions that can be granted to enterprise admins.
Question
List and describe two AD CS role services.
Question
Discuss how certificates issued to network devices can be used.
Question
Describe restricted enrollment agents.
Question
Match between columns
The entity that issues the certificates
public key infrastructure
The entity that issues the certificates
CA
The entity that issues the certificates
asymmetric encryption
The entity that issues the certificates
symmetric encryption
The entity that issues the certificates
Online responder
The entity that issues the certificates
Enterprise PKI
The entity that issues the certificates
EFS
The entity that issues the certificates
Network Device Enrollment service
The entity that issues the certificates
SCEP
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
public key infrastructure
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
CA
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
asymmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
symmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Online responder
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Enterprise PKI
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
EFS
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Network Device Enrollment service
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
SCEP
If an enterprise has more than one CA, this MMC can be used to manage all of them
public key infrastructure
If an enterprise has more than one CA, this MMC can be used to manage all of them
CA
If an enterprise has more than one CA, this MMC can be used to manage all of them
asymmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
symmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
Online responder
If an enterprise has more than one CA, this MMC can be used to manage all of them
Enterprise PKI
If an enterprise has more than one CA, this MMC can be used to manage all of them
EFS
If an enterprise has more than one CA, this MMC can be used to manage all of them
Network Device Enrollment service
If an enterprise has more than one CA, this MMC can be used to manage all of them
SCEP
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
public key infrastructure
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
CA
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
asymmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
symmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Online responder
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Enterprise PKI
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
EFS
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Network Device Enrollment service
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
SCEP
Very secure, but also resource intensive, requiring a lot of processing power
public key infrastructure
Very secure, but also resource intensive, requiring a lot of processing power
CA
Very secure, but also resource intensive, requiring a lot of processing power
asymmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
symmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
Online responder
Very secure, but also resource intensive, requiring a lot of processing power
Enterprise PKI
Very secure, but also resource intensive, requiring a lot of processing power
EFS
Very secure, but also resource intensive, requiring a lot of processing power
Network Device Enrollment service
Very secure, but also resource intensive, requiring a lot of processing power
SCEP
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
public key infrastructure
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
CA
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
asymmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
symmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Online responder
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Enterprise PKI
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
EFS
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Network Device Enrollment service
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
SCEP
Can be used by individual users to encrypt their data
public key infrastructure
Can be used by individual users to encrypt their data
CA
Can be used by individual users to encrypt their data
asymmetric encryption
Can be used by individual users to encrypt their data
symmetric encryption
Can be used by individual users to encrypt their data
Online responder
Can be used by individual users to encrypt their data
Enterprise PKI
Can be used by individual users to encrypt their data
EFS
Can be used by individual users to encrypt their data
Network Device Enrollment service
Can be used by individual users to encrypt their data
SCEP
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
public key infrastructure
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
CA
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
asymmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
symmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Online responder
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Enterprise PKI
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
EFS
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Network Device Enrollment service
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
SCEP
Specifically designed to support automatic request and retrieval of certificates for network devices
public key infrastructure
Specifically designed to support automatic request and retrieval of certificates for network devices
CA
Specifically designed to support automatic request and retrieval of certificates for network devices
asymmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
symmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
Online responder
Specifically designed to support automatic request and retrieval of certificates for network devices
Enterprise PKI
Specifically designed to support automatic request and retrieval of certificates for network devices
EFS
Specifically designed to support automatic request and retrieval of certificates for network devices
Network Device Enrollment service
Specifically designed to support automatic request and retrieval of certificates for network devices
SCEP
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Designing and Implementing a PKI
1
The ____ is used to request certificates on behalf of a user and provides a signature.

A) enrollment agent
C) enrollment standard
B) certificate intermediary
D) enrollment GUI
A
2
The ____ is the first CA in the hierarchy.

A) basis CA
C) root CA
B) original CA
D) subordinate CA
C
3
Using ____, you can execute command-line commands from one server against a remote server.

A) WinRS
C) WinRM
B) WinSAT
D) WCEUtil
C
4
When a ____ key pair is used, one key encrypts the data and the other key decrypts the data.

A) public/private
C) symmetric
B) private/private
D) bilateral
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A CA can be a company such as VeriSign that issues certificates for use on the Internet, or it can be a software component, such as Microsoft's Certification Authority, that issues certificates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Once the CA is created, it can be used to issue certificates.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The same public key can decrypt information encrypted with the public key.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The first time a user encrypts data using EFS, a ____ key pair is generated.

A) private
C) symmetric
B) public/private
D) bifurcated
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
When a public and private key are used for encryption, the process is called ____.

A) symmetric encryption
C) bilateral encryption
B) asymmetric encryption
D) dual encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ involves the creation, issuing, managing, and revoking of certificates.

A) Certificate threat management
C) Public key management
B) Certificate life cycle management
D) Certificate Practice Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ allows an administrator to configure certificates to be issued to clients without them having to request the certificates.

A) Autoprovisioning
B) Autoenrollment
C) Autocertification
D) Autoconfiguration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
An established public CA will have a root certificate in the ____.

A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.

A) smart card
C) trusted computing base
B) token
D) trusted computing module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Revoked certificates are published by the CA via a(n) ____ using an X.509 version 2 certificate.

A) invalid certificates list (ICL)
C) certificate practice statement (CPS)
B) certificate revocation list (CRL)
D) certificate life cycle list (CLCL)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.

A) Public-key snap-in
C) Encryption snap-in
B) Computer Management snap-in
D) Certificates snap-in
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ is used to issue and manage certificates.

A) public key registry
C) public key store
B) public key cryptography
D) public key infrastructure
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A PKI may appear complex on the surface but is actually rather simple.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ____ is a complete listing of all certificates revoked by the CA.

A) new CRL
C) alpha CRL
B) delta CRL
D) revocation CRL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A ____ is a number created by performing a hashing algorithm on data.

A) signature
C) cipher
B) key
D) hash
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Explain how you can view certificates in the Trusted Root Certification Authority.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ___________________ lists only the changes since the last CRL publication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Explain automatic certificate enrollment.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The Network Device Enrollment service uses a(n) ____ to accept the registration requests.

A) certification authority
C) enrollment authority
B) registration authority
D) requirements authority
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ___________________ provides authentication, integrity, and non-repudiation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____ add advanced cryptographic settings to the certificate, and can be used with Windows Vista and later clients.

A) V1 templates
C) V3 templates
B) V2 templates
D) V4 templates
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
AD CS publishes the full CRL once a ____ by default.

A) day
C) month
B) week
D) year
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
List two purposes for which certificates are used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
List the four steps required to complete the configuration of the online responder.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Users in the ___________________ role are granted Backup File and Directories and Restore File and Directories permissions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Users in the ____ role are granted the Manage Auditing and Security Log permissions.

A) Administrator
C) Auditor
B) Approver
D) Validator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Explain how to deploy trusted root certificates via group policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
AD CS publishes a delta CRL once a ____ by default.

A) day
C) month
B) week
D) year
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Explain how the online responder service is configured.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
You can use the ____ to view and manage all of the certificate stores used by the computer, users, or services on a computer.

A) Policies MMC
C) System MMC
B) Computer Management MMC
D) Certificates MMC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
List and describe two permissions that can be granted to enterprise admins.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
List and describe two AD CS role services.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Discuss how certificates issued to network devices can be used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe restricted enrollment agents.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
The entity that issues the certificates
public key infrastructure
The entity that issues the certificates
CA
The entity that issues the certificates
asymmetric encryption
The entity that issues the certificates
symmetric encryption
The entity that issues the certificates
Online responder
The entity that issues the certificates
Enterprise PKI
The entity that issues the certificates
EFS
The entity that issues the certificates
Network Device Enrollment service
The entity that issues the certificates
SCEP
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
public key infrastructure
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
CA
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
asymmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
symmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Online responder
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Enterprise PKI
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
EFS
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Network Device Enrollment service
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
SCEP
If an enterprise has more than one CA, this MMC can be used to manage all of them
public key infrastructure
If an enterprise has more than one CA, this MMC can be used to manage all of them
CA
If an enterprise has more than one CA, this MMC can be used to manage all of them
asymmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
symmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
Online responder
If an enterprise has more than one CA, this MMC can be used to manage all of them
Enterprise PKI
If an enterprise has more than one CA, this MMC can be used to manage all of them
EFS
If an enterprise has more than one CA, this MMC can be used to manage all of them
Network Device Enrollment service
If an enterprise has more than one CA, this MMC can be used to manage all of them
SCEP
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
public key infrastructure
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
CA
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
asymmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
symmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Online responder
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Enterprise PKI
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
EFS
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Network Device Enrollment service
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
SCEP
Very secure, but also resource intensive, requiring a lot of processing power
public key infrastructure
Very secure, but also resource intensive, requiring a lot of processing power
CA
Very secure, but also resource intensive, requiring a lot of processing power
asymmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
symmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
Online responder
Very secure, but also resource intensive, requiring a lot of processing power
Enterprise PKI
Very secure, but also resource intensive, requiring a lot of processing power
EFS
Very secure, but also resource intensive, requiring a lot of processing power
Network Device Enrollment service
Very secure, but also resource intensive, requiring a lot of processing power
SCEP
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
public key infrastructure
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
CA
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
asymmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
symmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Online responder
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Enterprise PKI
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
EFS
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Network Device Enrollment service
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
SCEP
Can be used by individual users to encrypt their data
public key infrastructure
Can be used by individual users to encrypt their data
CA
Can be used by individual users to encrypt their data
asymmetric encryption
Can be used by individual users to encrypt their data
symmetric encryption
Can be used by individual users to encrypt their data
Online responder
Can be used by individual users to encrypt their data
Enterprise PKI
Can be used by individual users to encrypt their data
EFS
Can be used by individual users to encrypt their data
Network Device Enrollment service
Can be used by individual users to encrypt their data
SCEP
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
public key infrastructure
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
CA
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
asymmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
symmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Online responder
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Enterprise PKI
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
EFS
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Network Device Enrollment service
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
SCEP
Specifically designed to support automatic request and retrieval of certificates for network devices
public key infrastructure
Specifically designed to support automatic request and retrieval of certificates for network devices
CA
Specifically designed to support automatic request and retrieval of certificates for network devices
asymmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
symmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
Online responder
Specifically designed to support automatic request and retrieval of certificates for network devices
Enterprise PKI
Specifically designed to support automatic request and retrieval of certificates for network devices
EFS
Specifically designed to support automatic request and retrieval of certificates for network devices
Network Device Enrollment service
Specifically designed to support automatic request and retrieval of certificates for network devices
SCEP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.