cryptology Flashcards
a _______ is electronic document used to bind a public key with an identity
digital certificate
a ______ is a hierarchy of computers that issue and manages certificates
public key infrastructure (PKI)
a _____ policy requires a administrator to manually approve or deny all request
manual
a _______ policy allows CA’s to review information within the request to determine if it is valid information
automatic
the _______ is a list of certificates revoked by the CA
certificate revocation list (CRL)
a ______ is used to checks the status of an individual digital certificate to verify if it is good or has been revoked
Online certificate status protocol (OCSP)
they are responsible for issuing tickets, holding certificate practice statements (CPS) and publishing the certificate revocation list (CRL)
subordinate CA
it is a declaration of the security that the organization is implementing for all certificates issued by the CA
certificate practice statement (CPS)
they can be used in large, enterprise environments to offload client enrollment request by handling the verification prior to certificates being issued
registration authority (RA)
a ______ issues certificates.
certificate authority (CA)
To request a certificate, a client must first
generate a public and private key pair.
a public and private key pair is generated by an application called a
cryptographic service provider (CSP)
when requesting a certificate from a CA, the client sends identifying information along with a copy of the public key this is called
certificate signing request (CSR).
the certificate revocation list (CRL) is published at the
CRL Distribution Point (CDP)
________ is the official standard of ITU Telecommunication Standardization Sector (ITU-T) that identifies the format for public key certificates and certification path validation.
X.509