Matching
Match each statement with the correct term below.
Premises:
The entity that issues the certificates
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
If an enterprise has more than one CA, this MMC can be used to manage all of them
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Very secure, but also resource intensive, requiring a lot of processing power
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Can be used by individual users to encrypt their data
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Specifically designed to support automatic request and retrieval of certificates for network devices
Responses:
asymmetric encryption
Enterprise PKI
CA
public key infrastructure
symmetric encryption
Network Device Enrollment service
EFS
Online responder
SCEP
Correct Answer:
Premises:
Responses:
The entity that issues the certificates
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
If an enterprise has more than one CA, this MMC can be used to manage all of them
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Very secure, but also resource intensive, requiring a lot of processing power
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Can be used by individual users to encrypt their data
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Specifically designed to support automatic request and retrieval of certificates for network devices
Premises:
The entity that issues the certificates
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
If an enterprise has more than one CA, this MMC can be used to manage all of them
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Very secure, but also resource intensive, requiring a lot of processing power
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Can be used by individual users to encrypt their data
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Specifically designed to support automatic request and retrieval of certificates for network devices
Responses:
Related Questions
Q18: A _ is a number created by
Q19: The Network Device Enrollment service uses a(n)
Q20: AD CS publishes the full CRL once
Q21: List the four steps required to complete
Q22: A CA can be a company such
Q24: Users in the _ role are granted
Q25: After installing certificate services, the name of
Q26: AD CS publishes a delta CRL once
Q27: The first time a user encrypts data
Q28: The _ is the first CA in