Filters
Question type

Study Flashcards

Match the following terms to the appropriate definitions. -A process in which keys are managed by a third party, such as a trusted CA​


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

Correct Answer

verifed

verified

​Select below the secure alternative to the telnet protocol:


A) ​HTTPS
B) ​TLS
C) ​IPsec
D) ​SSH

Correct Answer

verifed

verified

A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.

Correct Answer

verifed

verified

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?


A) Certificate practice statement (CPS)
B) Certificate policy (CP)
C) Lifecycle policy (LP)
D) Access policy (AP)

Correct Answer

verifed

verified

Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:


A) Personal digital
B) Public digital
C) Private digital
D) Server digital

Correct Answer

verifed

verified

Explain the difference between key revocation versus key suspension.

Correct Answer

verifed

verified

The revocation of a key is permanent; ke...

View Answer

Match the following terms to the appropriate definitions. -The type of trust relationship that can exist between individuals or entities.​


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

Correct Answer

verifed

verified

List and describe the entities for which IPsec is transparent.

Correct Answer

verifed

verified

Applications. Programs do not have to be...

View Answer

The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.

Correct Answer

verifed

verified

List the three PKI trust models that use a CA.

Correct Answer

verifed

verified

The models are the hierarchica...

View Answer

When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?


A) web of
B) mutual
C) third-party
D) distributed

Correct Answer

verifed

verified

____________________ may be defined as confidence in or reliance on another person or entity.

Correct Answer

verifed

verified

The process by which keys are managed by a third party, such as a trusted CA, is known as?


A) Key escrow
B) Key destruction
C) Key renewal
D) Key management

Correct Answer

verifed

verified

What protocol below supports two encryption modes: transport and tunnel?


A) HTTPS
B) IPSec
C) SSL
D) TLS

Correct Answer

verifed

verified

A framework for all of the entities involved in digital certificates for digital certificate management is known as:


A) Public key infrastructure
B) Network key infrastructure
C) Private key infrastructure
D) Shared key infrastructure

Correct Answer

verifed

verified

List three general duties of a CA.

Correct Answer

verifed

verified

Generate, issue, and distribute public k...

View Answer

Using what mechanism below can the non-repudiation of an e-mail and its content be enforced?


A) Symmetric encryption
B) Private encryption
C) Asymmetric encryption
D) Elliptic encryption

Correct Answer

verifed

verified

Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​A trust model with one CA that acts as a facilitator to interconnect all other CAs


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

Correct Answer

verifed

verified

What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?


A) Blocking
B) Hashing
C) Encrypting
D) Cloning

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer