SEC + Ch 4Explain how digital certificates are managed.

Ace your homework & exams now with Quizwiz!

What is a cipher suite?

A cipher suite is a named combination of the encryption, authentication, and message authentication code (MAC) algorithms that are used with SSL and TLS.

List the four stages of a certificate life cycle. on co

Creation, suspension, revocation, and expiration.

What is the S/MIME protocol used for? ,

The Secure/Multipurpose Internet Mail Extensions protocol is for securing email messages. It allows users to send encrypted messages that are also digitally signed. on

What is a cryptographic key? the encrypt

cryptographic key is a value that serves as input to an algorithm, which then transforms plaintext into ciphertext (and vice versa for decryption). A key, which is essentially a random string of bits, serves as an input parameter for symmetric and asymmetric cryptographic algorithms and selected hash algorithms t-->

What protocol uses SSL or TLS to secure communications between a browser and a web server? EndFragment--

The Hypertext Transport Protocol Secure (HTTPS) D

List the three PKI trust models that use a CA. tab-inter

The models are the hierarchical trust model, the distributed trust model, and the bridge trust model.

Explain how Cipher Block Chaining (CBC) operates. paddin

After being encrypted, each ciphertext block gets "fed back" into the encryption process to encrypt the next plaintext block. Using CBC, each block of plaintext is XORed with the previous block of ciphertext before being encrypted. CBC is also dependent on the previous ciphertext block, making it much more difficult to break. mil

What are the three areas of protection provided by IPSEC? s to send encr

Authentication, confidentiality, and key management html>

Explain how digital certificates are managed.

Several entities and technologies are used for the management of digital certificates, such as applying, registering, and revoking. These include the Certificate Authority (CA), along with a Certificate Revocation List (CRL) and a Certificate Repository (CR). In addition, digital certificates can be managed through a Web browser.

What role does a key recovery agent fulfill in an enterprise environment? ell-none;mso-b

The KRA is a highly trusted person responsible for recovering lost or damaged digital certificates. Digital certificates can then be archived along with the user's private key. If the user is unavailable or if the certificate is lost, the certificate with the private key can be recovered mso-b


Related study sets

first trad 2000 words example sentences

View Set

ch. 12: Global Markets in Action

View Set

Ch. 4-4: Gender Roles and Differences

View Set

Ch 1 Introduction to Tax Smartbook

View Set

Establishing a Business (Partnerships, Corporations, etc.)

View Set