Security+ Chapter 6 Review Questions

Ace your homework & exams now with Quizwiz!

*a. Certificate Signing Request (CSR)* b. digital digest c. FQDN form d. digital certificate

1. A __________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.

a. web digital certificate b. email web certificate *c. server digital certificate* d. personal digital certificate

10. To ensure a secure cryptographic connection between a web browser and a web server, a(n) ____________ would be used.

a. Personal Web-Client Certificate b. Advanced Web Server Certificate (AWSC) c. X.509 Certificate *d. Extended Validation SSL Certificate*

11. A digital certificate that turns the address bar green is a(n) __________.

a. first b. second *c. third* d. fourth

12 The __________-party trust model supports CA.

*a. are widely accepted in the industry* b. are used to create public keys only c. define how hashing algorithms are created d. have been replaced by PKI

13. Public Key Cryptography Standards (PKCS) __________.

a. The root signs all digital certificate authorities with a single key. b. It assigns a single hierarchy with one master CA. *c. It is designed for use on a large scale.* d. The master CA is called the root.

14. Which statement is NOT true regarding hierarchical trust models?

a. in tokens *b. in digests* c. on the user's local system d. embedded in digital certificates

15. Which of these is NOT where keys can be stored?

a. creates private key cryptography *b. is the management of digital certificates* c. requires the use of an RA instead of a CA d. generates public/private keys automatically

16. Public Key Infrastructure (PKI) __________.

a. enforcement certificate (EF) b. certificate practice statement (CPS) *c. certificate policy (CP)* d. signature resource guide (SRG)

17. A(n) __________ is a published set of rules that govern the operation of a PKI.

a. revocation *b. authorization* c. creation d. expiration

18. Which of these is NOT part of the certificate life cycle?

*a. Key escrow* b. Remote key administration c. Trusted key authority d. Key authorization

19. __________ refers to a situation in which keys are managed by a third party, such as a trusted CA.

a. Certficate Revocation List (CRL) *b. Online Certificate Status Protocol (OCSP)* c. CA Registry Database (CARD) d. Real-Time CA Verification (RTCAV)

2. __________ performs a real-time lookup of a digital certificate's status.

*a. Secure Shell (SSH)* b. Secure Sockets Layer (SSL) c. Secure Hypertext Transport Protocol (SHTTP) d. Transport Layer Security (TLS)

20. __________ is a protocol for securely accessing a remote computer.

*a. Session keys* b. Encrypted signatures c. Digital digests d. Digital certificates

3. __________ are symmetric keys to encrypt and decrypt information exchanged during the session, and to verify its integrity.

*a. SSL v2.0* b. TLS v1.0 c. TLS v1.1 d. TLS v1.3

4. Which of these is considered the weakest cryptographic transport protocol?

a. digital signature b. encrypted signature *c. digital certificate* d. digest

5. The strongest technology that would assure Alice that Bob is the sender of a message is a(n):

a. a user's private key with the public key b. a private key with a digital signature c. a user's public key with his private key *d. the user's identity with his public key*

6. A digital certificate associates __________.

a. to encrypt channels to provide secure communication between clients and servers b. to verify the identity of clients and servers on the Web *c. to verify the authenticity of the Registration Authorizer* d. to encrypt messages for secure email communciations

7. Digital certificates can be used for each of these EXCEPT __________.

*a. Certificate Authority (CA)* b. Signature Authority (SA) c. Certificate Signatory (CS) d. Digital Signer (DS)

8. An entity that issues digital certificates is a __________.

a. Digital Signature Approval List (DSAP) *b. Certificate Repository (CR)* c. Authorized Digital Signature (ADS) d. Digital Signature Permitted Authorization (DSPA)

9. A centralized directory of digital certificates is called a(n) __________.


Related study sets

RM 357E Intro to Risk Management with McClellan

View Set

GRE 20 Social Psychology- Final (integration of theory 2 and gre 21)

View Set

Photosynthesis and Cellular Respiration Short Answer

View Set

ASCP Board of Certification MLS Computer Adaptive Testing exam review 17JUL20 1-44 QUESTIONS

View Set

Organization Rewards and Compensation Exam 2

View Set

MRU8.3: Price Ceilings: Lines and Search Costs

View Set