Security+ Chapter 6 Review Questions
*a. Certificate Signing Request (CSR)* b. digital digest c. FQDN form d. digital certificate
1. A __________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.
a. web digital certificate b. email web certificate *c. server digital certificate* d. personal digital certificate
10. To ensure a secure cryptographic connection between a web browser and a web server, a(n) ____________ would be used.
a. Personal Web-Client Certificate b. Advanced Web Server Certificate (AWSC) c. X.509 Certificate *d. Extended Validation SSL Certificate*
11. A digital certificate that turns the address bar green is a(n) __________.
a. first b. second *c. third* d. fourth
12 The __________-party trust model supports CA.
*a. are widely accepted in the industry* b. are used to create public keys only c. define how hashing algorithms are created d. have been replaced by PKI
13. Public Key Cryptography Standards (PKCS) __________.
a. The root signs all digital certificate authorities with a single key. b. It assigns a single hierarchy with one master CA. *c. It is designed for use on a large scale.* d. The master CA is called the root.
14. Which statement is NOT true regarding hierarchical trust models?
a. in tokens *b. in digests* c. on the user's local system d. embedded in digital certificates
15. Which of these is NOT where keys can be stored?
a. creates private key cryptography *b. is the management of digital certificates* c. requires the use of an RA instead of a CA d. generates public/private keys automatically
16. Public Key Infrastructure (PKI) __________.
a. enforcement certificate (EF) b. certificate practice statement (CPS) *c. certificate policy (CP)* d. signature resource guide (SRG)
17. A(n) __________ is a published set of rules that govern the operation of a PKI.
a. revocation *b. authorization* c. creation d. expiration
18. Which of these is NOT part of the certificate life cycle?
*a. Key escrow* b. Remote key administration c. Trusted key authority d. Key authorization
19. __________ refers to a situation in which keys are managed by a third party, such as a trusted CA.
a. Certficate Revocation List (CRL) *b. Online Certificate Status Protocol (OCSP)* c. CA Registry Database (CARD) d. Real-Time CA Verification (RTCAV)
2. __________ performs a real-time lookup of a digital certificate's status.
*a. Secure Shell (SSH)* b. Secure Sockets Layer (SSL) c. Secure Hypertext Transport Protocol (SHTTP) d. Transport Layer Security (TLS)
20. __________ is a protocol for securely accessing a remote computer.
*a. Session keys* b. Encrypted signatures c. Digital digests d. Digital certificates
3. __________ are symmetric keys to encrypt and decrypt information exchanged during the session, and to verify its integrity.
*a. SSL v2.0* b. TLS v1.0 c. TLS v1.1 d. TLS v1.3
4. Which of these is considered the weakest cryptographic transport protocol?
a. digital signature b. encrypted signature *c. digital certificate* d. digest
5. The strongest technology that would assure Alice that Bob is the sender of a message is a(n):
a. a user's private key with the public key b. a private key with a digital signature c. a user's public key with his private key *d. the user's identity with his public key*
6. A digital certificate associates __________.
a. to encrypt channels to provide secure communication between clients and servers b. to verify the identity of clients and servers on the Web *c. to verify the authenticity of the Registration Authorizer* d. to encrypt messages for secure email communciations
7. Digital certificates can be used for each of these EXCEPT __________.
*a. Certificate Authority (CA)* b. Signature Authority (SA) c. Certificate Signatory (CS) d. Digital Signer (DS)
8. An entity that issues digital certificates is a __________.
a. Digital Signature Approval List (DSAP) *b. Certificate Repository (CR)* c. Authorized Digital Signature (ADS) d. Digital Signature Permitted Authorization (DSPA)
9. A centralized directory of digital certificates is called a(n) __________.