Chapter 6 PKI Flashcards

1
Q

What is a PFX/.pfx extension?

A

or .p12 extension is used to export a certificate along with its private key. The file is password protected and can archive or transport a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a P7B extension?

A

extension bundles multiple certificates into a single file. It is used to deliver a chain of certificates that are trusted by the processing host. It does not contain a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a CER?

A

an actual certificate that contains information about the subject like name and location. It is written in either binary DER or ASCII PEM data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a CRT?

A

is the same as a .cer file extension. It is a basic certificate that contains information about the subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do public root certificates work?

A

Allow users to trust a website using the chain of trust to the root authority. Private organizations must load employee web browsers with internal root certificates to verify internal websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Domain validation?

A

proving the ownership of a domain, which may be proved by responding to an email to the authorized point of contact. This process is highly vulnerable to compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the typical lifespan of a certificate

A

10+ years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is a certificate usually renewed

A

Before it expires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by a certificate being rekeyed

A

When a new key is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is stapling?

A

Mechanism used to mitigate performance and privacy issues when requesting certificate status from an OCSP responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is stapling used in securing privacy with OCSP?

A

by having the SSL/TLS web server periodically obtain a time-stamped OCSP response from the CA. When a client submits an OCSP request, the web server returns the time-stamped response, rather than making the client contact the OCSP responder itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is pinning?

A

refers to several techniques to ensure that when a client inspects the certificate presented by a server or a code-signed application, it is inspecting the proper certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is Pinning implemented?

A

By embedding the certificate data in the application code. or by submitting one or more public keys to an HTTP browser via an HTTP header, which is referred to as HTTP Public Key Pinning (HPKP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is distinguished Encoding Rules (DER)

A

The binary format used to structure the information in a digital certificate. Like Cryptographic data-both certificates and keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ASCII

A

7-bit code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a convention?

A

A three file character file extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What convention is widely used for ASCII format files in Linux

A

.PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does PKCS #12 format allow you to do?

A

export of the private key with the certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

On windows what extension would a PKCS #12 format have?

A

.PFX

20
Q

What is the command to create a RSA key pair in Linux?

A

openssl genrsa -aes256 -out cakey.pem 4096

21
Q

What are the steps to configure a Root CA?

A
  1. Setup a directory structure and adapt an OpenSSL config file
  2. Create an RSA key pair
  3. Use the RSA key pair to generate a self-signed root X.509 digital certificate
22
Q

What are the steps to configure a Certificate Signing Request?

A

1.Create a CSR with a new key pair
2.Complete the prompts
3.Transmit the CSR file to the CA server
4. On the CA run the command to sign the CSR and output the X.509 certificate
Transmit the .pem file to the web server and update the server config to use it and the private key

23
Q

What do you do when you have a certificate that has been working previously but doesnt work now?

A

Check that the cert. has not expired or been revoked or suspended

24
Q

If you have a problem with a new cert. What should you do?

A

Check the key usage settings are appropriate for the app.

Check that the subject name is correctly configured and that the client is using the correct address

25
Q

What do you do when troubleshooting a Cert. that is correctly configured but isnt working

A

Check the clients have been configured with the appropriate chain of trust.
Verify that the time and data settings are a common cause of cert. problems

26
Q

What is a Digital Certificate

A

Assertion of identity

27
Q

In Public Key Infrastructure, when you want others to send you confidential messages how do you go about doing that?

A

You give them your public key to use to encrypt the message.

The message then can only be decrypted by your private key

28
Q

In Public Key Infrastructure When you want to authenticate yourself to others. How do you do it?

A

You create a signature and sign t by encrypting the signature with your private key.
You give others your public key to use to decrypt the signature.

29
Q

What is certificate chaining or Chain of trust?

A

When every leaf certificate can be traced back to the root

30
Q

What can find in a Certificate Signing Request?

A

Info that the subject wants to use in the cert. and its public key

31
Q

What is a Registration Authority (RAs)?

A

Entities that complete identity checking and submit CSRs on behalf of end-users, but they don’t sign or issue certs.

32
Q

What is a digital certificate?

A

A wrapper for a subjects public key and also stores info about the subject and the certs issuer or guarantor

33
Q

What is Public Key Cryptography Standards (PKCS)?

A

Series of standards defining certificate authorities and digital certificates

34
Q

If a new subdomain is added to a cert. Do you need to make a new cert to add the new subdomain?

A

Yes, unless the Certificate is using a wild card symbol to compensate for all subdomains including new ones

35
Q

What does it mean when an extension is tagged as critical

A

The application processing the cert. must be able to interpret the extension correctly

36
Q

How does Domain Validation work?

A

By responding to an email to the authorized domain contact or by publishing a text record to the domain

37
Q

Identification

A

Creating an accountant od ID that uniquely represents the user, device, or process on the network

38
Q

Authentication

A

Proving that a subject is who it claims to be when it attempts to access the resource

39
Q

Authorization

A

Determining what rights subjects should have on each resource, and enforcing those rights

40
Q

Accounting

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted

41
Q

Authentication, authorization, and accounting (AAA)

A

A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

42
Q

knowledge factor (logon)

A

Passwords/PIN something you know in oreder to authenticate yourself

43
Q

What is an ownership factor

A

Something you have The account holder possesses something that no one else does such as smart cards, fobs, or wristbands programmed with a unique identity cert.

44
Q

What is a Biometric factor / Something you are

A

Uses either physiological identifiers, such as a fingerprint or behavioral identifiers,

45
Q

Multifactor Authentication (MFA)

A

An authentication scheme that requires the user to present at least two different factors as credentials

46
Q

Two-Factor Authentification (2FA)

A

combines either an ownership-based smart card or biometric identifier with something you know