Chapter 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

16. Which of the following is not part of the certificate life cycle?

A. Authorization

20. Which transport encryption algorithm is integrated as part of IPv6?

A. IPsec

18. _____ is a protocol for securely accessing a remote computer.

A. Secure Shell (SSH)

12. Dual sided digital certificates ________.

A. are used in military and financial settings when it is necessary for the client to authenticate back to the server.

15. A(n) _____ is a published set of rules that govern the operation of a PKI.

A. certificate policy (CP)

13. Which of the following is not where keys can be stored?

A. in hashes

3. Digital certificates can be used for each of the following except ________.

A. to verify the authenticity of the Registration Authorizer

6. Each of the following is a field of an X.509 certificate except ________.

B. CA expiration code

11. Each of the following is true regarding hierarchical trust models except ________.

B. It is designed for use on a large scale

7. In order to ensure a secure cryptographic connection between a Web browser and a Web server, a(n) _____ digital certificate would be used.

B. server digital certificate

2. A digital certificate associates ________.

B. the user's identity with their public key

8. A digital certificate that turns the address bar green is a(n) ________.

C. Extended Validation SSL Certificate

19. What is the cryptographic transport protocol that is used most often to secure Web transactions?

C. HTTPS

9. The ______ party trust model supports CA.

C. third

4. An entity that issues digital certificates is a(n) ________.

D. Certificate Authority (CA)

5. A centralized directory of digital certificates is called a(n) ________.

D. Certificate Repository (CR)

17. _____ refers to a situation in which keys are managed by a third party, such as a trusted CA.

D. Key escrow

10. Public-Key Cryptography Standards (PKCS) ________.

D. are widely accepted in the industry

1. The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________.

D. digital certificate

14. Public key infrastructure (PKI) ________.

D. is the management of digital certificates


Ensembles d'études connexes

Lesson 1: Observing the Night Sky

View Set

Standard Form of Linear Equations, Standard Form of Linear Equations, Linear equation forms

View Set

Wa Life and Disability Insurance - Washington Laws and Rules

View Set

ECON 2143 Exam #2 Chapter 12 & 13 Study Questions

View Set

NSG 333 Ch 23- Nursing Care of the Newborn with Special Needs

View Set

Exam 1 Questions (CH. 1-3 LT & Quizzes)

View Set

SmartBook Chapter 10: Planning for Capital Investments

View Set

Class: Living Environment 2020-21

View Set

MAR3023 Chapter 5: Consumer Behavior

View Set