CIT 270 Chapter 6 Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A hierarchical trust model signs digital certificate authorities with how many keys? a. 2 b. 4 c. 1 d. 16

1

___________ is a protocol for securely assessing a remote computer. a. Secure Shell (SSH) b. Secure Sockets Layer (SSL) c. Secure Hypertext Transport Protocol (SHTTP) d. Transport Layer Security (TLS)

Secure Shell (SSH)

Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server: a. Personal digital b. Public digital c. Private digital d. Server digital

Server digital

A(n) _____________ is a published set of rules that govern the operation of a PKI a. enforcement certificates (EF) b. certificate practice statement (CPS) c. certificate policy (CP) d. signature resource guide (SRG)

certificate policy (CP)

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _______________________ a. digital signature b. encrypted signature c. digital certificate d. digest

digital certificate

Which of these is NOT where keys can be stored? a. in tokens b. in digests c. on the user's local system d. embedded in digital certificates

in digests

Public key infrastructure (PKI)___________. a. creates a private key cryptography b. is the management of digital certificates c. requires the use of an RA instead of a CA d. generates public/private keys automatically

is the management of digital certificates

​SSL and TLS keys of what length are generally considered to be strong? ​a. 128 ​b. 1024 ​c. 2048 ​d. 4096

4096

Using what mechanism below can the non-repudiation of an e-mail and it's content be enforced? a. Symmetric encryption b. Private encryption c. Asymmetric encryption d. Elliptic encryption

Asymmetric encryption

What kind of certificate is typically used by an individual to secure e-mail transmissions? a. Private digital b. Personal digital c. Public digital d. Server digital

Personal digital

Public Key Cryptography Standards are based on which of the following? a. RSA public key algorithm b. Blowfish hash c. TLS/SSL d. Digital Signatures

RSA public key algorithm

Select below the secure alternative to the telnet protocol: ​a. HTTPS ​b. TLS ​c. IPsec ​d. SSH

SSH

Which of these is considered the weakest cryptography transport protocol? a. SSL v2.0 b. TLS v1.0 c. TLS v1.1 d. TLS v1.3

SSL v2.0

In order to ensure a secure cryptographic connection between a web browser and a web server, a(n) _____________ would be used. a. web digital certificate b. email web certificate c. server digital certificate d. personal digital certificate

server digital certificate

Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server. a. session keys b. Encrypted Signatures c. Digital digests d. digital certificate

session keys

A digital certificate associates ________________________ a. a user's private key with the public key b. a private key with a digital signature c. a user's public key with his private key d. the user's identity with his public key

the user's identity with his public key

The _______________ -party trust model supports CA a. first b. second c. third d. fourth

third

When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established? a. web of b. mutual c. third-patry d. distributed

third-patry

Digital certificates can be used for each of these EXCEPT ______________ a. to encrypt channels to provide secure communication between clients and servers b. to verify the identity of clients and servers on the web c. to verify the authenticity of the Registration Authorizer d. to encrypt messages for secure email communications

to verify the authenticity of the Registration Authorizer

How can an EV SSL help users avoid dangerous sites? a. By blocking websites that are known to be malicious b. By disabling Java automatically upon connecting to a malicious site c. By displaying a warning upon connecting to a dangerous site d. By displaying the address bar in red

By displaying the address bar in red

Which of the following is used to digitally sign a certificate? a. CSR b. CA Public key c. CA Private key d. RA

CA Private key

What is the biggest difference between a CA and an RA? a. RAs generate private keys and CAs generate public keys b. Certificate Authorities can generate public key certificates c. CAs primarily process certificate revocation requests d. RAs are more reliable than CAs

Certificate Authorities can generate public key certificates

An entity that issues digital certificates is a _____________________ a. Certificate Authority (CA) b. Signature Authority (SA) c. Certificate Signatory (CS) d. Digital Signer (DS)

Certificate Authority (CA)

A centralized directory of digital certificates is a _________________. a. Digital Signature Approval List (DSAP) b. Certificate Repository (CR) c. Authorized Digital Signature (ADS) d. Digital Signature Permitted Authorization (DSPA)

Certificate Repository (CR)

A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate a. Certificate Signing Request (CSR) b. digital digest c. FQDN form d. digital certificate

Certificate Signing Request (CSR)

A digital certificate that turns the address bar green is a(n) ___________________ a. Personal Web-Client Certificate b. Advanced Web Server Certificate (AWSC) c. X.509 Certificate d. Extended Validation SSL Certificate

Extended Validation SSL Certificate

The Authentication Header (AH) protocol is a part of what encryption protocol suite below? a. TLS 3.0 b. IPSec c. GPG d. SSL

IPSec

Which statement is NOT true regarding hierarchical trust models? a. the root signs all digital certificate authorities with a single key b. It assigns a single hierarchy with one master CA c. It is designed for use on a large scale d. The master CA is called the root

It is designed for use on a large scale

The process by which keys are managed by a third party, such as a trusted CA, is known as? a. Key escrow b. Key destruction c. Key renewal d. Key management

Key escrow

__________ refers to a situation in which keys are managed by a third party, such as a trusted CA. a. Key escrow b. Remote Key administration c. Trusted key authority d. Key authorization

Key escrow

A protocol that performs a real-time lookup of a certificate's status. a. Certificate Revocation List (CRL) b. Online Certificate Status Protocol (OCSP) c. CA Registry Database (CARD) d. Real-Time CA Verification (RTCAV)

Online Certificate Status Protocol (OCSP)

Where are private keys NOT stored? a. On a user's local hardware b. Within software on a local system c. Within a token d. Within digital certificates

Within digital certificates

Public Key Cryptographic Standards (PKCS) ______________ a. are widely accepted in the industry b. are used to create public keys only c. define how hashing algorithms are created d. have been replaced by PKI

are widely accepted in the industry

Which of these is NOT part of the certificate life cycle? a. revocation b. authorization c. creation d. expiration

authorization


Set pelajaran terkait

AP Stat Unit 3 Progress Check: MCQ Part A

View Set

Hoffman Services Marketing Ch. 1-10

View Set

NCLEX questions for critical thinking

View Set

Mngt. Ch. 12: Managing Human Talent (Exam 3)

View Set

Organizational Behavior- CH 8 Groups & Teams

View Set