3.5.10 I.S.E Flashcards

1
Q

An SSL client has determined that the certificate authority (CA) issuing a server’s certificate is on its list of trusted CAs.

What is the next step in verifying the server’s identity?

The CA’s public key validates the CA’s digital signature on the server certificate.

The domain on the server certificate must match the CA’s domain name.

The master secret is generated from common key code.

The post-master secret must initiate subsequent communication.

A

The CA’s public key validates the CA’s digital signature on the server certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would require that a certificate be placed on the CRL?

The certificate validity period is exceeded.

The private key is compromised.

The encryption key algorithm is revealed.

The signature key size is revealed.

A

The private key is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which technology was developed to help improve the efficiency and reliability of checking the validity status of certificates in large, complex environments?

Certificate revocation list

Online Certificate Status Protocol

Key escrow

Private key recovery

A

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A PKI is an implementation for managing which type of encryption?

Asymmetric

Symmetric

Hashing

Steganography

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the process of obtaining a digital certificate, which entity may a certificate authority rely on to perform the validation of the certificate signing request (CSR)?

Certificate revocation list

Online Certificate Status Protocol

Registration authority

Root authority

A

Registration authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A medium-sized e-commerce company is planning to upgrade their website’s security by acquiring a certificate from a certificate authority (CA).

The company wants to ensure that the certificate not only validates their domain ownership but also verifies the legitimacy of their organization. They are also looking for a validation process that can be completed within 1 to 3 days.

As the IT manager for the company, which level of CA validation would you recommend?

Self-signed certificate

Organization validation

Extended validation

Domain validation

A

Organization validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The network administrator for an international e-commerce company that operates multiple online stores must ensure secure communication across various subdomains.

To streamline secure sockets layer/transport layer security (SSL/TLS) certificate management and implement a robust public key infrastructure (PKI), the network administrator must identify the most suitable solution for efficiently securing the company’s numerous subdomains within the PKI.

What is the MOST suitable solution for efficiently securing the multiple subdomains of the company’s online stores within the PKI?

Wildcard certificates

Certificate revocation lists (CRLs)

Self-signed certificates

Certificate pinning

A

Wildcard certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A private key has been stolen. Which action should you take to deal with this crisis?

Recover the private key from escrow

Delete the public key

Place the private key in escrow

Add the digital certificate to the CRL

A

Add the digital certificate to the CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are concerned that if a private key is lost, all documents encrypted with your private key will be inaccessible.

Which service should you use to solve this problem?

Key escrow

OCSP

RA

CSP

A

Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements accurately describes the root of trust model in a public key infrastructure (PKI)?

The root of trust model defines how users and different CAs can trust one another, with each CA issuing itself a root certificate.

In the root of trust model, the root certificate is issued by a third-party CA, not the organization’s own CA.

The root of trust model involves a root certificate that is issued by a user, not a CA.

The root of trust model involves multiple root certificates, each issued by a different certificate authority (CA).

A

The root of trust model defines how users and different CAs can trust one another, with each CA issuing itself a root certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly