Comptia+ Chapter 4 Flashcards

1
Q

Third party

A

And entity that is trusted by other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital certificate

A

A technology used to associate a user’s identity to a public key and that has been “digitally signed” by a trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certificate authority

A

Entity that is responsible for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Registration authority

A

Entity responsible for verifying credentials of the applicant that is applying for a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificate signing request (CSR) generation

A

The process for requesting a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate repository

A

A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificate revocation list (CRL)

A

List of certificate serial numbers that have been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Online certificate status protocol (OCSP)

A

Process that performs a real-time lookup of a certificate’s status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Root of trust

A

Tracing a certificate back to the highest level of a CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Self-signed

A

A signed digital certificate that does not depend on any higher-level authority for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Root digital certificate

A

Digital certificate that is created and verified by a CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intermediate certificates

A

Digital certificates that have been issued by intermediate CAs. Next level of trust after root digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User digital certificate

A

Endpoint of a certificate chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain validation digital certificate

A

Verifies the identity of the entity that has control over the domain name. Simply verifies who has control and not trustworthiness of individuals behind the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extended Validation (EV) certificate

A

More extensive verification of the legitimacy of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wildcard digital certificate

A

A certificate used to validate a main domain along with all subdomains.

17
Q

Subject Alternative Name (SAN)

A

Allows a single digital certificate to specify additional host names to be protected and permits a certificate to cover multiple IP addresses

18
Q

Machine/Computer digital certificate

A

Verify the identity of a device in a network transaction

19
Q

Code signing

A

A process by which software developers digitally sign a program to prove that the software comes from the entity that signed it and that no unauthorized third party has altered it

20
Q

Email digital certificate

A

Allows a user to digitally sign and encrypt mail messages

21
Q

Public key infrastructure (PKI)

A

The underlying infrastructure for the management of keys and digital certificates at scale

22
Q

Key management system

A

A method of controlling public keys, private keys, and digital certificates

23
Q

Hierarchical trust model

A

One master CA called the root signs all digital certificate authorities with a single key

24
Q

Distributed trust model

A

Multiple CAs can sign digital certificates. CAs can delegate authority to other intermediate CAs to sign digital certificates

25
Bridge trust model
One CA acts as a facilitator to interconnect all other CAs. Does not issue digital certificates; acts as a hub between hierarchical trust models and distributed trust models
26
Certificate policy (CP)
Published set of rules that govern the operation of a PKi
27
Key escrow
A process in which keys are managed by a third party, such as a trusted CA
28
Transport/communication encryption
Cryptographic algorithms that are used to protect data in transit
29
Tunneling
Data that is encapsulated within a secure outer shell
30
Transport Layer Security (TLS)
A widespread cryptographic transport algorithm that replaces SSL
31
Internet Protocol Security (IPSec)
A set of protocols that provide security for all IP traffic by directly encrypting IP packets.