Security Awareness - Ch4 Unit 4 Quiz
An entity that issues digital certificates is a _____. Signature Authority (SA) Certificate Signatory (CS) Digital Signer (DS) Certificate Authority (CA)
Certificate Authority (CA)
A centralized directory of digital certificates is called a(n) _____. Digital Signature Permitted Authorization (DSPA) Authorized Digital Signature (ADS) Certificate Repository (CR) Digital Signature Approval List (DSAP)
Certificate Repository (CR)
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? Counter (CTR) Cipher Block Chaining (CBC) Galois/Counter (GCM) Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
What entity calls in crypto modules to perform cryptographic tasks? Crypto service provider OCSP Chain Intermediate CA Certificate Authority (CA)
Crypto service provider
Which digital certificate displays the name of the entity behind the website? Extended Validation (EV) Certificate Online Certificate Status Certificate Session Certificate X.509 Certificate
Extended Validation (EV) Certificate
Which statement is NOT true regarding hierarchical trust models? It assigns a single hierarchy with one master CA. The root signs all digital certificate authorities with a single key. The master CA is called the root. It is designed for use on a large scale.
It is designed for use on a large scale.
_____ refers to a situation in which keys are managed by a third party, such as a trusted CA. Trusted key authority Remote key administration Key authorization Key escrow
Key escrow
_____ performs a real-time lookup of a digital certificate's status. Real-Time CA Verification (RTCAV) Online Certificate Status Protocol (OCSP) Certificate Revocation List (CRL) CA Registry Database (CARD)
Online Certificate Status Protocol (OCSP)
_____ is a protocol for securely accessing a remote computer. Secure Shell (SSH) Secure Sockets Layer (SSL) Secure Hypertext Transport Protocol (SHTTP) Transport Layer Security (TLS)
Secure Shell (SSH)
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. Encrypted signatures Digital digests Session keys Digital certificates
Session keys
Which of these is considered the strongest cryptographic transport protocol? SSL v2.0 TLS v1.0 TLS v1.2 SSL v2.0
TLS v1.2
Digital certificates can be used for each of these EXCEPT _____. to verify the identity of clients and servers on the Web to encrypt messages for secure email communications to encrypt channels to provide secure communication between clients and servers to verify the authenticity of the Registration Authorizer
to verify the authenticity of the Registration Authorizer
Which trust model has multiple CAs, one of which acts as a facilitator? Distributed Hierarchical Web Bridge
Bridge
Which of the following is NOT a method for strengthening a key? Variability Length Randomness Cryptoperiod
Variability
Which of these is NOT part of the certificate life cycle? expiration revocation creation authorization
authorization
A(n) _____ is a published set of rules that govern the operation of a PKI. signature resource guide (SRG) enforcement certificate (EF) certificate policy (CP) certificate practice statement (CPS)
certificate policy (CP)
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____. encrypted signature digital signature digital certificate digest
digital certificate
Public key infrastructure (PKI) _____. generates public/private keys automatically is the management of digital certificates creates private key cryptography requires the use of an RA instead of a CA
is the management of digital certificates
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? salt nonce initialization vector (IV) algorithm
salt
A digital certificate associates _____. a private key with a digital signature the user's identity with his public key a user's private key with the public key a user's public key with his private key
the user's identity with his public key