Security Awareness - Ch4 Unit 4 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An entity that issues digital certificates is a _____. Signature Authority (SA) Certificate Signatory (CS) Digital Signer (DS) Certificate Authority (CA)

Certificate Authority (CA)

A centralized directory of digital certificates is called a(n) _____. Digital Signature Permitted Authorization (DSPA) Authorized Digital Signature (ADS) Certificate Repository (CR) Digital Signature Approval List (DSAP)

Certificate Repository (CR)

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? Counter (CTR) Cipher Block Chaining (CBC) Galois/Counter (GCM) Electronic Code Book (ECB)

Cipher Block Chaining (CBC)

What entity calls in crypto modules to perform cryptographic tasks? Crypto service provider OCSP Chain Intermediate CA Certificate Authority (CA)

Crypto service provider

Which digital certificate displays the name of the entity behind the website? Extended Validation (EV) Certificate Online Certificate Status Certificate Session Certificate X.509 Certificate

Extended Validation (EV) Certificate

Which statement is NOT true regarding hierarchical trust models? It assigns a single hierarchy with one master CA. The root signs all digital certificate authorities with a single key. The master CA is called the root. It is designed for use on a large scale.

It is designed for use on a large scale.

_____ refers to a situation in which keys are managed by a third party, such as a trusted CA. Trusted key authority Remote key administration Key authorization Key escrow

Key escrow

_____ performs a real-time lookup of a digital certificate's status. Real-Time CA Verification (RTCAV) Online Certificate Status Protocol (OCSP) Certificate Revocation List (CRL) CA Registry Database (CARD)

Online Certificate Status Protocol (OCSP)

_____ is a protocol for securely accessing a remote computer. Secure Shell (SSH) Secure Sockets Layer (SSL) Secure Hypertext Transport Protocol (SHTTP) Transport Layer Security (TLS)

Secure Shell (SSH)

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. Encrypted signatures Digital digests Session keys Digital certificates

Session keys

Which of these is considered the strongest cryptographic transport protocol? SSL v2.0 TLS v1.0 TLS v1.2 SSL v2.0

TLS v1.2

Digital certificates can be used for each of these EXCEPT _____. to verify the identity of clients and servers on the Web to encrypt messages for secure email communications to encrypt channels to provide secure communication between clients and servers to verify the authenticity of the Registration Authorizer

to verify the authenticity of the Registration Authorizer

Which trust model has multiple CAs, one of which acts as a facilitator? Distributed Hierarchical Web Bridge

Bridge

Which of the following is NOT a method for strengthening a key? Variability Length Randomness Cryptoperiod

Variability

Which of these is NOT part of the certificate life cycle? expiration revocation creation authorization

authorization

A(n) _____ is a published set of rules that govern the operation of a PKI. signature resource guide (SRG) enforcement certificate (EF) certificate policy (CP) certificate practice statement (CPS)

certificate policy (CP)

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____. encrypted signature digital signature digital certificate digest

digital certificate

Public key infrastructure (PKI) _____. generates public/private keys automatically is the management of digital certificates creates private key cryptography requires the use of an RA instead of a CA

is the management of digital certificates

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? salt nonce initialization vector (IV) algorithm

salt

A digital certificate associates _____. a private key with a digital signature the user's identity with his public key a user's private key with the public key a user's public key with his private key

the user's identity with his public key


Set pelajaran terkait

CHAPTER 1: Completeing the App, Underwriting and Delivering the policy

View Set

Chapter 55: Caring for Clients with Disorders of the Male Reproductive System

View Set

Accounting Chapter 3: Connect Multiple Choice

View Set

ART Hist Final Background (prt2)

View Set