Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What length SSL and TLS keys are generally considered to be strong?

4096

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?

Certificate practice statement (CPS)

Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:

Certification Authority

What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?

Electronic Code Book

Root digital certificates are should never be self-signed. T/F

False

Stream ciphers work on multiple characters at a time. T/F

False

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?

IPSec

What protocol below supports two encryption modes: transport and tunnel?

IPSec

Why is IPsec considered to be a transparent security protocol?

IPsec is designed to not require modifications of programs, or additional training, or additional client setup.

What common method is used to ensure the security and integrity of a root CA?

Keep it in an offline state from the network

Select the secure alternative to the telnet protocol

SSH

What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?

SSL

What cryptographic transport algorithm is considered to be significantly more secure than SSL?

TLS

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

web server

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?

bridge trust

What allows an application to implement an encryption algorithm for execution?

crypto service providers

What type of trust model is used as the basis for most digital certificates used on the Internet?

distributed trust

Which of the following certificates verifies the identity of the entity that has control over the domain name?

domain validation digital certificate

The process by which keys are managed by a third party, such as a trusted CA, is known as?

key escrow

What term best represents the resiliency of a cryptographic key to attacks?

key strength

What is used to create session keys?

master secret

Which of the following is an input value that must be unique within some specified scope, such as for a given period or an entire session?

nonce

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

public key infrastructure

Which of the following certificates are self-signed?

root digital certificates

What is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest?

salt

When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?

third-party

Digital certificates should last forever. T/F

False

A Subject Alternative Name (SAN) digital certificate, is also known as a Unified Communications Certificate (UCC). T/F

True

A certificate repository (CR) is a publicly accessible centralized directory of digital certificates. T/F

True

A user electronically signs a Certificate Signing Request (CSR) by affixing their public key and then sending it to an intermediate certificate authority. T/F

True

SSL v3.0 served as the basis for TLS v1.0. T/F

True

Some CAs issue only entry-level certificates that provide domain-only validation. T/F

True

Some cryptographic algorithms require that in addition to a key another value can or must be input. T/F

True

At what stage can a certificate no longer be used for any type of authentication?

expiration

Which of the following is an enhanced type of domain digital certificate?

Extended Validation

A digital certificate is a technology used to associate a user's identity to a private key.

False

What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?

Galois/Counter

Which of the following is a valid way to check the status of a certificate? (Choose all that apply.) Online Certificate Status Protocol Certificate Revocation Authority Certificate Revocation List Revocation List Protocol

Online Certificate Status Protocol Certificate Revocation List

What process links several certificates together to establish trust between all the certificates involved?

certificate chaining

What process will remove all private and public keys along with the user's identification information in the CA?

destruction


Ensembles d'études connexes

Fundamentals of IT and Cybersecurity Chapter 3 Study Guide

View Set

Nutrition: Chapter 3 Practice Test

View Set

Operating Systems Ch. 7 Deadlock

View Set