Managing a Public Key Infrastructure Flashcards
Which of the following items are stored within a user PKI certificate? (Choose two.)
Public key
Intermediary CA
CRL
Expiration date
Public key
Expiration date
Among many other items, a PKI certificate contains a public key used for cryptographic purposes such as encryption and verifying digital signatures. Certificates have an expiration date after which the certificate is no longer valid and cannot be used
Which component sits at the top of a PKI hierarchy?
Intermediate CA
Root CA
CRL
Root CA
The root CA resides at the top of the PKI hierarchy, followed by issued certificates and registration authorities (RAs), which can issue certificates and subordinate registration authorities if required
What is established when a device trusts a pubic CA root certificate?
Certificate revocation
Registration authority
Chain of trust
Chain of trust
The PKI chain of trust is based on digital signatures written to issued certificates by a root or intermediary CA. For example, if a user device trusts RootCA1, then the user device trusts all certificates issued directly or indirectly by RootCA1
Users complain that they receive an untrusted web site warning in their web browsers when connecting to a HTTPS-enabled intranet web server, but not when they connect over HTTP. What is the most likely reason this is happening?
Users have not yet authenticated to the web site.
The web site is blocked by a content-filtering firewall.
The web server is using a self-signed certificate.
The web server is using a self-signed certificate.
HTTPS web server connectivity requires a PKI certificate installed on the server; HTTP does not. If the certificate is self-signed, meaning not issued by a trusted third-party issuer, then web browsers will present a security warning to users when they attempt to connect to the site
You are a Windows administrator that uses PowerShell scripts to manage Windows devices over the network. Only trusted scripts should run on hosts. What should you configure?
Intermediate CA
Code-signing certificate
Certificate signing request
Code-signing certificate
Script writers and software developers use code-signing certificates to digitally sign scripts or software files using a private key. Devices can be configured to run only trusted scripts or software, meaning that the signature can be verified with the correct public key
What should you do to harden your PKI? (Choose two.)
Ensure that public key files are password protected.
Ensure that the root CA is online.
Ensure that the root CA is offline.
Ensure that private key files are password protected.
Ensure that the root CA is offline.
Ensure that private key files are password protected.
If the root CA is compromised, all certificates in the hierarchy are compromised, so it should be kept offline unless it is needed, such as to create a new intermediate CA. While a key pair public key can be shared with anyone, private keys must be available only to the key pair owner, since private keys are used to decrypt messages and create digital signatures
Which of the following is never stored with a digital certificate?
Private key
Digital signature of issuing CA
IP address of CA server
IP address of CA server
The IP address of the issuing CA server is not stored in an issued certificate
You are providing consulting services to a legal firm that has a PKI. The firm would like to enable document workflow where documents are sent electronically to the appropriate internal employees. You are asked whether there is a way to prove that documents were sent from the user listed in the FROM field. Of the following, what would you recommend?
File encryption
Digital signatures
E-mail encryption
Digital signatures
A digital signature is created from a private key and is used to verify the authenticity and integrity of the message using the related public key
Which of the following best describes the term key escrow?
A trusted third party with decryption keys in case the original keys have expired
A trusted third party with copies of decryption keys in addition to existing original keys
An account that can be used to encrypt private keys
A trusted third party with copies of decryption keys in addition to existing original keys
Key escrow places private or secret keys in the possession of a trusted third party for safekeeping
Which PKI component verifies the identity of certificate requestors before a certificate is issued?
Public key
RA
Private key
RA
RAs are often referred to as intermediate CAs; they have the ability to accept certificate requests and either issue certificates or validate the request for issuance by another CA
A user reports that she is unable to authenticate to the corporate VPN while traveling. You have configured the VPN to require user certificate authentication. After investigating the problem, you learn that the user certificate has expired. Which of the following presents the quickest secure solution?
Create a new user certificate and configure it on the user’s computer.
Disable certificate authentication for your VPN.
Reduce the CRL publishing frequency.
Create a new user certificate and configure it on the user’s computer.
Expired certificates can no longer be used. A new certificate must be issued for the user
When users connect to an intranet server by typing https://intranet.corp.local, their web browser displays a warning message stating the site is not to be trusted. How can this warning message be removed while maintaining security?
Configure the web server to use HTTP instead of HTTPS.
Install the intranet server private key on all client workstations.
Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.
Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.
If users’ devices are configured with the correct trusted certificate for the intranet server certificate issuer, then user devices will trust certificates issued by that authority
An HTTPS-secured web site requires that you restrict some workstations from making a connection. Which option is the most secure?
Configure the web site to allow connections only from the IP addresses of valid workstations.
Configure the web site to use user authentication.
Configure the web site to require client-side certificates.
Configure the web site to require client-side certificates.
Mutual authentication requires both sides of a secured connection to authenticate with each other. Normally an HTTPS web site secures connections for anybody who has permissions to use the web site. To enhance security further, connecting devices can be required to have an installed and trusted certificate, which enables each party to validate the other’s identity
You are responsible for enabling TLS on a newly installed e-commerce web site. What should you do first? (Choose the best answer.)
Install the web server digital certificate.
Enable TLS on the web server.
Create a CSR and submit it to a CA.
Create a CSR and submit it to a CA.
Depending on which tool is used, acquiring a publicly trusted server certificate for an e-commerce site begins with generating a public/private key pair, filling out information such as company name and web server URL, and providing the public key to the CA; this is a certificate signing request (CSR)
A large national company with headquarters in Dallas, Texas, is implementing a PKI for thousands of users. There are corporate locations in 12 other major U.S. cities. Each of those locations has a senior network administrator that should retain control of IT for the location’s user base. User devices in all locations must trust all certificates issued within the company. Which option presents the PKI solution that reflects best practices?
Install a root CA in Dallas. Create intermediate CAs for each city, and use these to issue certificates for users and computers in each city. Take the root CA offline.
Install a root CA in Dallas. Issue certificates for users and computers in all locations.
Install a root CA in Dallas. Issue certificates for users and computers in all locations. Take the root CA offline.
Install a root CA in Dallas. Create intermediate CAs for each city, and use these to issue certificates for users and computers in each city. Take the root CA offline.
In larger enterprises, intermediate CAs can be deployed for cities, departments, subsidiary companies, and so on. Intermediate CA technicians then have control of that part of the PKI hierarchy. The root CA should be taken offline to enhance security; a compromised root CA means all certificates in the hierarchy are compromised. A compromised intermediary CA mean only its issued certificates are compromised