Sec+ Ch.4 HW

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of these is NOT part of the certificate life cycle?

authorization** expiration creation revocation

Which trust model has multiple CAs, one of which acts as a facilitator?

bridge ** web distributed hierarchical

An entity that issues digital certificates is a ____.

Certificate Signatory (CS) Digital Signer (DS) Signature Authority (SA) Certificate Authority (CA)**

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

Counter (CTR) Electronic Code Book (ECB) Galois/Counter (GCM) Cipher Block Chaining (CBC)**

a centralized directory of digital certificates is called a(n)____.

Digital Signature Permitted Authorization (DSPA) Authorized Digital Signature (ADS) Digital Signature Approval List (DSAP) Certificate Repository (CR)**

_____ performs a real-time lookup of a digital certificate's status.

Real-time CA Verification (RTCAV) Certificate Revocation List (CRL) Online Certificate Status Protocol (OCSP)** CA Registry Database (CARD)

A digital certificate associates____.

a user's public key with his private key a private key with a digital signature a user's private key with the public key the user's identity with his public key**

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

digital digest encrypted signatures session keys** digital certificates

Which statement is NOT true regarding hierarchical trust models?

it assigns a single hierarchy with one master CA the root signs all digital certificate authorities with a single key the master CA is called the root it is designed for use on a large scale**

Digital certificates can be used for each of these EXCEPT _____.

to verify the authenticity of the Registration Authorizer** to verify the identity of clients and servers on the web to encrypt channels to provide secure communication between clients and servers to encrypt messages for secure email communications

_____ is a protocol for securely accessing a remote computer.

Transport Layer Security (TLS) Secure Socket Layer (SSL) Secure Hypertext Transport Protocol (SHTTP) Secure Shell (SSH)**

_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.

Trusted key authority Key escrow** Key authorization Remote key administration

What entity calls in crypto modules to perform cryptographic tasks?

Certificate Authority (CA) OCSP Chain Crypto service provider** Intermediate CA

Public key infrastructure (PKI) _____.

is the management of digital certificates** requires the use of an RA instead of a CA creates private key cryptography generates public/private keys automatically

Which of the following is NOT a method for strengthening a key?

randomness length variability** cryptoperiod

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

salt** algorithm initialization vector (IV) nonce

A(n) _____ is a published set of rules that govern the operation of a PKI.

signature resource guide (SRG) certificate practice statement (CPS) certificate policy (CP)** enforcement certificate (EF)

Which of these is considered the strongest cryptographic transport protocol?

TLS v1.2** SSL v2.0 TLS v1.0 SSL v2.0

Which digital certificate displays the name of the entity behind the website?

X.509 Certificate online certificate status certificate extended validation (EV) certificate** session certificate

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ____

digest encrypted signature digital certificate** digital signature


Conjuntos de estudio relacionados

PrepU MedSurg: Acid-Base Balance

View Set

Intro to Sociology Ch.2 (practice)

View Set

prepU ch 23 Nursing Care of the Newborn with Special Needs

View Set

Constitutional Foundations of American Government (2) The Constitution

View Set

Chapter 20: Visual and Auditory Systems

View Set

Teaching Textbook Geometry Definitions, Theorems, Properties, and Postulates

View Set

Chapter 10 A&P 1 practice questions

View Set

Chapter 10, 11: Mobile Device Security, Access Control Fundamentals

View Set