Question | Answer |
A ___________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate. | Certificate Signing Request (CSR) |
____________ performs a real-time lookup of a digital certificate's status. | Online Certificate Status Protocol (OCSP) |
________________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. | Session Keys |
Which of these is considered the weakest cryptographic transport protocol? | SSL v2.0 |
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________. | Digital Certificate |
A digital certificate associates ____________. | the user's identity with his public key |
Digital certificates can be used for each of these EXCEPT ____________. | to verify the authenticity of the Registration Authorizer |
An entity that issues digital certificates is a ___________. | Certificate Authority (CA) |
A centralized directory of digital certificates is called a(n) ______________. | Certificate Repository (CR) |
In order to ensure a secure cryptographic connection between a web browser and a web server, a(n) _________ would be used. | Server Digital Certificate |
A digital certificate that turns the address bar green is a(n) ____________. | Extended Validation SSL Certificate |
The __________ party trust model supports CA. | Third (3rd) |
Public Key Cryptography Standards (PKCS) _______________. | are widely accepted in the industry |
Which statement is NOT true regarding hierarchical trust models? | It is designed for use on a large scale |
Which statement is NOT where keys can be stored? | in digests |
Public key infrastructure (PKI) ____________. | is the management of digital certificates |
A(n) _______________ is a published set of rules that govern the operation of a PKI. | certificate policy (CP) |
Which of these is NOT part of the certificate life cycle? | Authorization |
________________ refers to a situation in which keys are managed by a third party, such as a trusted CA. | Key escrow |
________________ is a protocol for securely accessing a remote computer. | Secure Shell (SSH) |
Want to create your own Flashcards for free with GoConqr? Learn more.