Chapter 6: Advanced Cryptography
Certificate Signing Request (CSR)
A _________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.
Certificate Repository (CR)
A centralized directory of digital certificates is called a(n) __________ .
The user's identity with his public key
A digital certificate associates ____________.
Extended Validation SSL Certificate
A digital certificate that turns the address bar green is a(n) ________.
Certificate Policy (CP)
A(n) _____ is a published set of rules that govern the operation of a PKI.
Certificate Authority (CA)
An entity that issues digital certificates is a ________.
Third
The ________-party trust model supports CA.
Digital Certificate
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.
Session keys
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
Secure Shell (SSH)
_____ is a protocol for securely accessing a remote computer.
Online Certificate Status Protocol (OCSP)
_____ performs a real-time lookup of a digital certificate's status.
Key Escrow
_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.
To verify the authenticity of the Registration Authorizer
Digital certificates cannot be used ________.
Server Digital Certificate
In order to ensure a secure cryptographic connection between a web browser and a web server, a(n) _____ would be used.
Are widely accepted in the industry
Public Key Cryptography Standards (PKCS) ________.
Is the management of digital certificates
Public Key Infrastructure (PKI) _____.
SSL v2.0
What is considered the weakest cryptographic transport protocol?
It is designed for use on a large scale.
What statement is NOT true regarding hierarchical trust models?
In digests
Where can keys NOT be stored?
Authorization
Which of these is NOT part of the certificate life cycle?