7.5.11
A private key has been stolen. Which action should you take to deal with this crisis?
Add the digital certificate to the CRL
In the certificate authority trust model known as a hierarchy, where does trust start?
Root CA
To obtain a digital certificate and participate in a public key infrastructure (PKI), what must be submitted and where?
Identifying data and a certification request to the registration authority (RA)
You are concerned that if a private key is lost, all documents encrypted with your private key will be inaccessible. Which service should you use to solve this problem?
Key escrow
An SSL client has determined that the certificate authority (CA) issuing a server's certificate is on its list of trusted CAs. What is the next step in verifying the server's identity?
The CA's public key must validate the CA's digital signature on the server certificate.
Which of the following would require that a certificate be placed on the CRL?
The private key is compromised.
Which of the following items are contained in a digital certificate? (Select two.)
Validity period.,Public key
Which standard is most widely used for certificates?
X.509
A PKI is an implementation for managing which type of encryption?
Asymmetric
Which technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large, complex environments?
Online Certificate Status Protocol