Security + Mod 7 Quiz
Certificate repository (CR)
A centralized directory of digital certificates is called a(n) _____.
The user's identity with their public key
Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a digital certificate associates or binds together. What would Olivia say?
CTR
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new value whenever a ciphertext block is exchanged?
Secure Shell (SSH)
Which is a protocol for securely accessing a remote computer in order to issue a command?
The web browser sends a message ("ClientHello") to the server.
Which is the first step in a key exchange?
To verify the identity of clients and servers on the Web
Which of the following can a digital certificate NOT be used for?
Application updates
Which of the following is NOT a means by which a newly approved root digital certificate is distributed?
Key escrow
Which refers to a situation in which keys are managed by a third party, such as a trusted CA?
Registration authority
Who verifies the authenticity of a CSR?
Session keys
are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
AH
which is an IPsec protocol that authenticates that packets received were sent from the source?
Online Certificate Status Protocol (OCSP)
Elton needs his application to perform a real-time lookup of a digital certificate's status. Which technology would he use?
ESP
How is confidentiality achieved through IPsec?
Domain validation
Juan needs a certificate that must only authenticate that a specific organization has the right to use a particular domain name. What type of certificate does he need?
Crypto service provider
What entity calls in crypto modules to perform cryptographic tasks?
P7B
What is the file extension for a Cryptographic Message Syntax Standard based on PKCS#7 that defines a generic syntax for defining digital signature and encryption?
CN
What is the name of the device protected by a digital certificate?
Certificate attributes
What is the name of the fields in an X.509 digital certificate that are used when the parties negotiate a secure connection?
To group and verify digital certificates
What is the purpose of certificate chaining?
Digital certificate
What is the strongest technology that would assure Alice that Bob is the sender of a message?