Lesson 6: Implementing PKI Flashcards

1
Q

A digital certificate

A

is a public assertion of identity, validated by a certificate authority (CA). As well as asserting identity, certificates can be issued for different purposes, such as protecting web server communications or signing messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public key infrastructure (PKI)

A

aims to prove that the owners of public keys are who they say they are. Under PKI, anyone issuing public keys should obtain a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certificate Authority (CA)

A

is the entity responsible for issuing and guaranteeing certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Online CA

A

is one that is available to accept and process certificate signing requests, publish certificate revocation lists, and perform other certificate management tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Offline CA

A

is a secure configuration involved in making the root disconnected from any network and usually kept in a powered-down state. The root CA will need to be brought online to add or update intermediate Cas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Registration

A

is the process by which end users create an account with the CA and become authorized to request certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificate Signing Request (CSR)

A

When a subject wants to obtain a certificate. The subject will complete a CSR and submits it to the CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Registration Authorities (RAs)

A

RAs complete identity checking and submit CSRs (Certificate Signing Request) on behalf of the end users. They do not sign or issue certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Certificates

A

Contains information about the subject and the certificate’s issuer or guarantor. The cert is digitally signed to prove that it was issued to the subject by a particular CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CN (Common Name)

A

was used to identify the FQDN by which the server is accessed, such as www.comptia.org. CN is now deprecated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SAN

A

(Subject Alternative Name) – is structured to represent different types of identifiers, including domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Certificate Policies

A

define the different uses of certificate types issued by the CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Server Certificate

A

guarantees the identity of e-commerce sites or any sort of website to which users submit data that should be kept confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Validation (DV)

A

proving the ownership of a particular domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extended Validation (EV)

A

a process that requires more rigorous checks on the subject’s legal identity and control over the domain or software being signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machine/Computer Certificates

A

issuing certs to machines (servers, PCs, smartphones, tablets, DCs, member servers, thin clients etc.)

17
Q

Email/User Certificates

A

used to sign and encrypt email messages, using Secure Multipart Internet Message Extension (S/MIME) or Pretty Good Privacy (PGP)

18
Q

Code Signing certificate

A

issued to a software publisher

19
Q

Root Certificate

A

identifies the CA (Certificate Authority). It is self signed. Usually use a key size of 2048 bits but many providers are switching to 4096 bits.

20
Q

Key Management – refers to operational considerations for the various stages in a key’s life cycle. A Keys life cycle may involve these steps:

A
  • Key generation—creating a secure key pair of the required strength, using the chosen cipher.
  • Certificate generation—to identify the public part of a key pair as belonging to a subject (user or computer), the subject submits it for signing by the CA as a digital certificate with the appropriate key usage. At this point, it is critical to verify the identity of the subject requesting the certificate and only issue it if the subject passes identity checks.
  • Storage—the user must take steps to store the private key securely, ensuring that unauthorized access and use are prevented. It is also important to ensure that the private key is not lost or damaged.
  • Revocation—if a private key is compromised, the key pair can be revoked to prevent users from trusting the public key.
  • Expiration and renewal—a key pair that has not been revoked expires after a certain period. Giving the key or certificate a “shelf-life” increases security. Certificates can be renewed with new key material.

Key management can be centralized, meaning that one administrator or authority controls the process, or decentralized, in which each user is responsible for his or her keys.

21
Q

M-of-N control,

A

meaning that of N number of administrators permitted to access the system, M must be present for access to be granted. M must be greater than 1, and N must be greater than M.

22
Q

Escrow

A

means that something is held independently. In terms of key management, this refers to archiving a key (or keys) with a third party.

23
Q

A certificate may be revoked or suspended:

A

revoked certificate is no longer valid and cannot be “un-revoked” or reinstated.

suspended certificate can be re-enabled.

24
Q

Certificate Revocation List (CRL)

A

informing users whether a cert is valid, revoked or suspended.

25
Q

Online Certificate Status Protocol (OCSP)

A

means of providing up to date information by checking the certificate status.

26
Q

Certificate “Pinning”

A

refers to several techniques to ensure that when a client inspects the cert presented by a server or a code-signed application, it is inspecting the proper certificate.

27
Q

Distinguished Encoding Rules (DER)

A

Cryptographic data—both certificates and keys—are processed as binary using DER.

28
Q

Privacy-enhanced Electronic Mail (PEM)

A

When the binary data is represented as ASCII text characters using Base64

29
Q

The PKCS #12 format

A

allows the export of the private key with the certificate. This would be used either to transfer a private key to a host that could not generate its own keys, or to back up/archive a private key. This type of file format is usually password-protected and always binary. (PKCS#12/ .PFX/ .P12)

30
Q

P7B format

A

implements PKCS #7, which is a means of bundling multiple certificates in the same file. It is typically in ASCII format.