Unit 4 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which trust model has multiple CAs, one of which acts as a facilitator? Hierarchical Distributed Web Bridge

Bridge

What entity calls in crypto modules to perform cryptographic tasks? OCSP Chain Intermediate CA Certificate Authority (CA) Crypto service provider

Crypto service provider

Which digital certificate displays the name of the entity behind the website? Online Certificate Status Certificate Extended Validation (EV) Certificate Session Certificate X.509 Certificate

Extended Validation (EV) Certificate

Which statement is NOT true regarding hierarchical trust models? The master CA is called the root. It assigns a single hierarchy with one master CA. The root signs all digital certificate authorities with a single key. It is designed for use on a large scale.

It is designed for use on a large scale.

_____ refers to a situation in which keys are managed by a third party, such as a trusted CA. Trusted key authority Remote key administration Key authorization Key escrow

Key escrow

_____ performs a real-time lookup of a digital certificate's status. Online Certificate Status Protocol (OCSP) CA Registry Database (CARD) Certificate Revocation List (CRL) Real-Time CA Verification (RTCAV)

Online Certificate Status Protocol (OCSP)

_____ is a protocol for securely accessing a remote computer. Secure Shell (SSH) Transport Layer Security (TLS) Secure Hypertext Transport Protocol (SHTTP) Secure Sockets Layer (SSL)

Secure Shell (SSH)

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. Encrypted signatures Digital digests Digital certificates Session keys

Session keys

Which of the following is NOT a method for strengthening a key? Length Cryptoperiod Randomness Variability

Variability

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? initialization vector (IV) salt nonce algorithm

salt

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? Counter (CTR) Cipher Block Chaining (CBC) Galois/Counter (GCM) Electronic Code Book (ECB)

CBC

A centralized directory of digital certificates is called a(n) _____. Digital Signature Permitted Authorization (DSPA) Certificate Repository (CR) Authorized Digital Signature (ADS) Digital Signature Approval List (DSAP)

Certificate Repository (CR)

Which of these is considered the strongest cryptographic transport protocol? TLS v1.0 SSL v2.0 SSL v2.0 TLS v1.2

TLS v1.2

An entity that issues digital certificates is a _____. Digital Signer (DS) Signature Authority (SA) Certificate Signatory (CS) Certificate Authority (CA)

Certificate Authority (CA)

Which of these is NOT part of the certificate life cycle? revocation authorization expiration creation

authorization

A(n) _____ is a published set of rules that govern the operation of a PKI. certificate practice statement (CPS) enforcement certificate (EF) signature resource guide (SRG) certificate policy (CP)

certificate policy (CP)

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____. digest digital certificate encrypted signature digital signature

digital certificate

Public key infrastructure (PKI) _____. generates public/private keys automatically creates private key cryptography requires the use of an RA instead of a CA is the management of digital certificates

is the management of digital certificates

A digital certificate associates _____. a user's public key with his private key a user's private key with the public key a private key with a digital signature the user's identity with his public key

the user's identity with his public key

Digital certificates can be used for each of these EXCEPT _____. to verify the identity of clients and servers on the Web to encrypt messages for secure email communications to encrypt channels to provide secure communication between clients and servers to verify the authenticity of the Registration Authorizer

to verify the authenticity of the Registration Authorizer


Set pelajaran terkait

Macronutrient Metabolism-Proteins

View Set

Business Dynamics - Chapter 6: Business Formation

View Set

N321: Final Exam - Musculoskeletal

View Set