A) Making copies in one location
B) Making multiple copies in multiple locations
C) Key archiving
D) key recovery
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Make copies of the private key and keep it in several locations for redundancy.
B) The lifetime of the key should correspond with how often it is used and the sensitivity of the data it is protecting.
C) The key should be changed at the end of its lifetime and not used past its allowed lifetime.
D) The key should be properly destroyed at the end of its lifetime.
Correct Answer
verified
Multiple Choice
A) Centralized infrastructure
B) Decentralized infrastructure
C) Hybrid infrastructure
D) Peer-to-peer infrastructure
Correct Answer
verified
Multiple Choice
A) A structure that enables parties to use communications such as e-mail
B) A structure that provides all of the components needed for entities to communicate securely and in a predictable manner
C) A structure that enables secure communications in chat rooms,and when instant messaging and text messaging
D) Is another name for digital signatures
Correct Answer
verified
Multiple Choice
A) Key recovery
B) Key escrow
C) Key archiving system
D) Private key protection
Correct Answer
verified
Multiple Choice
A) Hybrid
B) Star
C) Peer-to-peer
D) Hierarchical
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) You can be sure of the certificate's validity indefinitely.
B) You can be sure of the certificate's validity until the expiration date.
C) You cannot be sure of the certificate's validity and must check the CRL each time before use.
D) You cannot be sure of the certificate's validity and must check the RA each time before use.
Correct Answer
verified
Showing 41 - 50 of 50
Related Exams