Filters
Question type

Study Flashcards

Match the following terms to the appropriate definitions. -​A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

K) B) and G)
L) A) and C)

Correct Answer

verifed

verified

Digital certificates cannot be used to identify objects other than users.

A) True
B) False

Correct Answer

verifed

verified

A sensitive connection between a client and a web server uses what class of certificate?


A) Class 1
B) Class 2
C) Class 3
D) Class 4

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

B

Match the following terms to the appropriate definitions. -​A trust model that has multiple CAs that sign digital certificates


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

K) B) and D)
L) F) and I)

Correct Answer

verifed

verified

E

What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?


A) SSL
B) TLS
C) PEAP
D) EAP

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -A trusted third-party agency that is responsible for issuing digital certificates​


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

K) D) and I)
L) A) and F)

Correct Answer

verifed

verified

Key ____________________ dates prevent an attacker who may have stolen a private key from being able to decrypt messages for an indefinite period of time.

Correct Answer

verifed

verified

Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?


A) third-party trust
B) related trust
C) managed trust
D) distributed trust

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Discuss the three areas of protection that are provided by IPsec.

Correct Answer

verifed

verified

Authentication. IPsec authenticates that...

View Answer

What is the name for an organization that receives, authenticates, and processes certificate revocation requests?


A) Registration Authority
B) Certificate Authority
C) Repudiation Authority
D) Intermediate Authority

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

In the SSH suite, the ____________________ command allows a user to log on to a remote computer.

Correct Answer

verifed

verified

What kind of certificate is typically used by an individual to secure e-mail transmissions?


A) Private digital
B) Personal digital
C) Public digital
D) Server digital

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

List the four stages of a certificate life cycle.

Correct Answer

verifed

verified

Creation
S...

View Answer

In the SSH suite, the ____________________ command allows a user to copy files between remote computers. ​Match the following terms to the appropriate definitions.​ a.​Bridge trust model b.Certificate Authority (CA)​ c.Certificate Repository​ d.​Digital certificate e.​Distributed trust model

Correct Answer

verifed

verified

scp

Identify the general duties of an RA.

Correct Answer

verifed

verified

Receive, authenticate, and process certi...

View Answer

Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:


A) Registration Authority
B) Delegation Authority
C) Certification Authority
D) Participation Authority

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

​SSL and TLS keys of what length are generally considered to be strong?


A) ​128
B) ​1024
C) ​2048
D) ​4096

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​A trust model in which two individuals trust each other because each individually trusts a third party.


A) Bridge trust model
B) Certificate Authority (CA)
C) Certificate Repository
D) Digital certificate
E) Distributed trust model
F) key escrow
G) Public key Infrastructure (PKI)
H) Session keys
I) Third-party trust
J) Trust model

K) D) and J)
L) B) and D)

Correct Answer

verifed

verified

At what stage can a certificate no longer be used for any type of authentication?


A) creation
B) suspension
C) revocation
D) expiration

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?


A) bridge trust
B) distributed trust
C) third-party trust
D) transitive trust

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer