3.5.10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A private key has been stolen. Which action should you take to deal with this crisis? answer Place the private key in escrow Delete the public key Recover the private key from escrow Add the digital certificate to the CRL

Add the digital certificate to the CRL

A PKI is an implementation for managing which type of encryption? answer Symmetric Hashing Asymmetric Steganography

Asymmetric

You are concerned that if a private key is lost, all documents encrypted with your private key will be inaccessible. Which service should you use to solve this problem? answer OCSP RA Key escrow CSP

Key escrow

Which technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large, complex environments? answer Key escrow Certificate revocation list Private key recovery Online Certificate Status Protocol

Online Certificate Status Protocol

A medium-sized e-commerce company is planning to upgrade their website's security by acquiring a certificate from a certificate authority (CA). The company wants to ensure that the certificate not only validates their domain ownership but also verifies the legitimacy of their organization. They are also looking for a validation process that can be completed within 1 to 3 days. As the IT manager for the company, which level of CA validation would you recommend? answer Organization validation Extended validation Domain validation Self-signed certificate

Organization validation

In the process of obtaining a digital certificate, which entity may a certificate authority rely on to perform the validation of the certificate signing request (CSR)? answer Certificate revocation list Root authority Registration authority Online Certificate Status Protocol

Registration authority

An SSL client has determined that the certificate authority (CA) issuing a server's certificate is on its list of trusted CAs. What is the next step in verifying the server's identity? answer The domain on the server certificate must match the CA's domain name. The CA's public key validates the CA's digital signature on the server certificate. The post-master secret must initiate subsequent communication. The master secret is generated from common key code.

The CA's public key validates the CA's digital signature on the server certificate.

Which of the following would require that a certificate be placed on the CRL? answer The private key is compromised. The certificate validity period is exceeded. The encryption key algorithm is revealed. The signature key size is revealed.

The private key is compromised.

Which of the following statements accurately describes the root of trust model in a public key infrastructure (PKI)? answer The root of trust model defines how users and different CAs can trust one another, with each CA issuing itself a root certificate. In the root of trust model, the root certificate is issued by a third-party CA, not the organization's own CA. The root of trust model involves a root certificate that is issued by a user, not a CA. The root of trust model involves multiple root certificates, each issued by a different certificate authority (CA).

The root of trust model defines how users and different CAs can trust one another, with each CA issuing itself a root certificate.

The network administrator for an international e-commerce company that operates multiple online stores must ensure secure communication across various subdomains. To streamline secure sockets layer/transport layer security (SSL/TLS) certificate management and implement a robust public key infrastructure (PKI), the network administrator must identify the most suitable solution for efficiently securing the company's numerous subdomains within the PKI. What is the MOST suitable solution for efficiently securing the multiple subdomains of the company's online stores within the PKI? answer Certificate pinning Wildcard certificates Certificate revocation lists (CRLs) Self-signed certificates

Wildcard certificates


Set pelajaran terkait

6th Grade Chapter 5 Test Practice

View Set

PSY 242- Abnormal Psychology Final Exam

View Set

English Alphabet for Kindergarten

View Set

Chapter 9 Online Retail & Services Matching

View Set

Ch 21: Nursing Manage of Labor and Birth at Risk

View Set

CHAPTER FOUR: MANAGEMENT FRAUD & AUDIT RISK

View Set

Chapter 62: cerebrovascular disorders

View Set