CyberSecurityQuiz: Module 07 Public Key Infrastructure and Cryptographic Protocols

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is NOT a means by which a newly approved root digital certificate is distributed?

Application updates

What is the name of the device protected by a digital certificate?

CN

Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need?

Domain validation

What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?

. Certificate attributes

Which is an IPsec protocol that authenticates that packets received were sent from the source?

AH

Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged?

CTR

A centralized directory of digital certificates is called a(n) _____.

Certificate repository (CR)

What entity calls in crypto modules to perform cryptographic tasks?

Crypto service provider

What is the strongest technology that would assure Alice that Bob is the sender of a message?

Digital certificate

Which refers to a situation in which keys are managed by a third party, such as a trusted CA

Key escrow

Elton needs his application to perform a real-time lookup of a digital certificate's status. Which technology would he use?

Online Certificate Status Protocol (OCSP)

What is the file extension for a Cryptographic Message Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption?

P7B

Who verifies the authenticity of a CSR?

Registration authority

Which is a protocol for securely accessing a remote computer in order to issue a command?

Secure Shell (SSH

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Session keys

Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say?

The user's identity with their public key

Which is the first step in a key exchange?

The web browser sends a message ("ClientHello") to the server.

How is confidentiality achieved through IPsec?

ESP

What is the purpose of certificate chaining?

To group and verify digital certificates

Which of the following can a digital certificate NOT be used for?

To verify the identity of clients and servers on the Web


Ensembles d'études connexes

Chapter 19: Transoceanic Encounters and Global Connections

View Set

chapter 6: What sort of learning does classical conditioning explain?

View Set

Comprehension Check 2 - Sentences (TEFL)

View Set

PSC 100: Chapter 1 (Intro to Cognitive Psychology)

View Set

Chapter 10 - OSPF Tuning and Troubleshooting

View Set

HVACR Unit 18 - Special Refrigeration Components

View Set

IUHS Immunology Exam Master Questions

View Set