s12
9. The ______ party trust model supports C
A. ~~A. first B. second C. third *** D. fourth
6. Each of the following is a field of an X.509 certificate except ________.
A. validity period B. CA expiration code*** C. serial number D. signature
17. _____ refers to a situation in which keys are managed by a third party, such as a trusted C
A. ~~A. Remote key administration B. Trusted key authority C. Key authorization D. Key escrow***
16. Which of the following is not part of the certificate life cycle?
A. Authorization*** B. Creation C. Expiration D. Revocation
4. An entity that issues digital certificates is a(n) ________.
A. Certificate Signatory (CS) B. Signature Authority (SA) C. Digital Signer (DS) D. Certificate Authority (CA)***
5. A centralized directory of digital certificates is called a(n) ________.
A. Digital Signature Approval List (DSAP) B. Digital Signature Permitted Authorization (DSPA) C. Authorized Digital Signature (ADS) D. Certificate Repository (CR)***
20. Which transport encryption algorithm is integrated as part of IPv6?
A. IPsec*** B. SSH C. SSL/TLS D. RSA
11. Each of the following is true regarding hierarchical trust models except ________.
A. It assigns a signal hierarchy with one master CA B. It is designed for use on a large scale*** C. The master CA is called the root D. The root signs all digital certificate authorities with a single key
19. What is the cryptographic transport protocol that is used most often to secure Web transactions?
A. SHTTP B. PPPTPoE C. HTTPS*** D. MD-17
18. _____ is a protocol for securely accessing a remote computer.
A. Secure Shell (SSH) *** B. Secure Sockets Layer (SSL) C. Secure Hypertext Transport Protocol (SHTTP) D. Transport Layer Security (TLS)
8. A digital certificate that turns the address bar green is a(n) ________.
A. X.509 Certificate B. Advanced Web Server Certificate (AWSC) C. Extended Validation SSL Certificate*** D. Personal Web-Client Certificate
2. A digital certificate associates ________.
A. a private key with a digital signature B. the user's identity with their public key*** C. a user's private key with the public key D. a user's public key with their private key
12. Dual sided digital certificates ________.
A. are used in military and financial settings when it is necessary for the client to authenticate back to the server.*** B. are the same as dual key digital certificates. C. are required under PKCS #1 D. require a special browser
10. Public-Key Cryptography Standards (PKCS) ________.
A. are used to create public keys only B. define how hashing algorithms are created C. have been replaced by PKI D. are widely accepted in the industry***
15. A(n) _____ is a published set of rules that govern the operation of a PKI.
A. certificate policy (CP)*** B. certificate practice statement (CPS) C. signature resource guide (SRG) D. enforcement certificate (EF)
14. Public key infrastructure (PKI) ________.
A. creates private key cryptography B. requires the use of an RA instead of a CA C. generates public/private keys automatically D. is the management of digital certificates ***
1. The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________.
A. digital signature B. encrypted signature C. hash D. digital certificate ***
7. In order to ensure a secure cryptographic connection between a Web browser and a Web server, a(n) _____ digital certificate would be used.
A. e-mail Web certificate B. server digital certificate*** C. personal digital certificate D. Web digital certificate
13. Which of the following is not where keys can be stored?
A. in hashes*** B. on the user's local system C. embedded in digital certificates D. in tokens
3. Digital certificates can be used for each of the following except ________.
A. to verify the authenticity of the Registration Authorizer *** B. to verify the identity of clients and servers on the Web C. to encrypt messages for secure e-mail communications D. to encrypt channels to provide secure communication between clients and servers