Chapter 6 Review Questions

Beschreibung

For exam 2
Odin D.
Karteikarten von Odin D., aktualisiert more than 1 year ago
Odin D.
Erstellt von Odin D. vor mehr als 6 Jahre
17
0

Zusammenfassung der Ressource

Frage Antworten
A ___________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate. Certificate Signing Request (CSR)
____________ performs a real-time lookup of a digital certificate's status. Online Certificate Status Protocol (OCSP)
________________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. Session Keys
Which of these is considered the weakest cryptographic transport protocol? SSL v2.0
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________. Digital Certificate
A digital certificate associates ____________. the user's identity with his public key
Digital certificates can be used for each of these EXCEPT ____________. to verify the authenticity of the Registration Authorizer
An entity that issues digital certificates is a ___________. Certificate Authority (CA)
A centralized directory of digital certificates is called a(n) ______________. Certificate Repository (CR)
In order to ensure a secure cryptographic connection between a web browser and a web server, a(n) _________ would be used. Server Digital Certificate
A digital certificate that turns the address bar green is a(n) ____________. Extended Validation SSL Certificate
The __________ party trust model supports CA. Third (3rd)
Public Key Cryptography Standards (PKCS) _______________. are widely accepted in the industry
Which statement is NOT true regarding hierarchical trust models? It is designed for use on a large scale
Which statement is NOT where keys can be stored? in digests
Public key infrastructure (PKI) ____________. is the management of digital certificates
A(n) _______________ is a published set of rules that govern the operation of a PKI. certificate policy (CP)
Which of these is NOT part of the certificate life cycle? Authorization
________________ refers to a situation in which keys are managed by a third party, such as a trusted CA. Key escrow
________________ is a protocol for securely accessing a remote computer. Secure Shell (SSH)
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr