6.4 Implement public key infrastructure Flashcards

1
Q

CA

A

(certificate authority) A server that can issue digital certificates and the associated public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intermediate CA

A

The intermediate CAs get certified from the root, then the intermediate CAs issue certificates to subjects (leafs or end entities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CRL

A

(certificate revocation list) A list of certificates that were revoked before their expiration date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OCSP

A

(Online Certificate Status Protocol) A means of checking a certificate’s status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSR

A

(Certificate Signing Request) A Base64 ASCII file that a subject sends to a CA to get a certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Public Key

A

The component of asymmetric encryption that can be accessed by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Private Key

A

In asymmetric encryption, the private key is known only to the holder and is linked to, but not derivable from, a public key distributed to those with which the holder wants to communicate securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Online vs. offline CA

A

An online CA is one that is available to accept and process certificate signing requests, publish certificate revocation lists, and perform other certificate management tasks. Because of the high risk posed by compromising the root CA, a secure configuration involves making the root an offline CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OCSP Stapling

A

Uses SSL/TLS to periodically obtain a time-stamped OCSP response from the CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certificate Pinning

A

Refers to several techniques to ensure that when a client inspects the certificate presented by a server or a code-signed application, it is inspecting the proper certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trust Model

A

A trust model shows how users and different CAs are able to trust one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key escrow

A

Refers to archiving a key (or keys) with a third party. This is a useful solution for organizations that don’t have the capability to store keys securely themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Certificate Chaining

A

A method of validating a certificate by tracing each CA that signs the certificate, up through the hierarchy to the root CA. Also referred to as chain of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SAN

A

(Storage Area Network) A network dedicated to data storage, typically consisting of storage devices and servers connected to switches via host bus adapters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Code signing certificate

A

Issued to a software publisher, following some sort of identity check and validation process by the CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Self-signed certificates

A

Any machine, web server, or program code can be deployed with a self-signed certificate. Self-signed certificates will be marked as untrusted by the operating system or browser, but an administrative user can choose to override this.

17
Q

Machine/computer certificates

A

It might be necessary to issue certificates to machines (servers, PCs, smartphones, and tablets), regardless of function.

18
Q

Email certificates

A

An email certificate can be used to sign and encrypt email messages, typically using S/MIME or PGP.

19
Q

Root

A

The one that identifies the CA itself. The root certificate is self-signed.

20
Q

Domain validation

A

Proving the ownership of a particular domain. This may be proved by responding to an email to the authorized domain contact or by publishing a text record to the domain. This process can be highly vulnerable to compromise.

21
Q

Extended validation

A

Subjecting to a process that requires more rigorous checks on the subject’s legal identity and control over the domain or software being signed.

22
Q

Certificate formats

A

All certificates use an encoding scheme called Distinguished Encoding Rules (DER) to create a binary representation of the information in the certificate

23
Q

Certificate

A

An X.509 digital certificate is issued by a certificate authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization.