Public Key Infrastructure Flashcards

1
Q

An organization is using OCSP to validate certificates within its PKI infrastructure. What is not a legitimate response to a validation request?

Good

Validated

Unknown

A

Validated

Within the OCSP framework, the legitimate responses from the OCSP responder are “good,” “revoked,” and “unknown.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For your organization’s encryption systems, which of the following should you implement to act as a centralized server to store and distribute your public and private keys?

Key management server

Digital certificate

CRL

A

Key management server

A key management server is a centralized storage system that takes care of the process of distributing, storing, and backing up keys for users of an enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To improve the integrity and authentication of your encryption systems, you have contacted a certificate authority to generate which of the following items for you?

Digital certificate and public/private key pair

Public key and a private hash

Private key and a certificate

A

Digital certificate and public/private key pair

When a user’s identification is established, the CA generates public and private keys for the user. A certificate is then generated with the identification and public key information embedded within it. Once the user is registered and receives his certificate, he can begin using it to send encrypted messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to store your company’s private key in a safe, secure place. Which of the following would you use?

Save it on a hard drive in plain text.

Seal it in an envelope and store it at your home office.

Encrypt it on a flash memory device.

A

Encrypt it on a flash memory device.

Private keys should never be stored in plain text. If they’re stolen, an unauthorized user will be able to use them to decrypt messages and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have started using a third-party key escrow company to protect your encryption keys. Which of the following do you send to them?

Encryption key to decrypt a private key file

Encryption key to decrypt a public key file

Copy of a public key

A

Encryption key to decrypt a private key file

In a key escrow storage scheme, an encryption key used to encrypt and decrypt the private key file is stored offsite with a third party. If access is needed to the backup copy of the private key, the encryption key needs to be obtained from the third-party company after you’ve been properly authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your recovery encryption key is split between seven of your coworkers, of which only four are required to be present to decrypt the private key. Which of the following methods are you using for key recovery?

Steganography

Key escrow

M of N control

A

M of N control

In this key-recovery scheme, a prescribed number of the key owners must be present with their parts of the key. M of N control refers to the number of operator keys that must be present to create the recovery key, such as 2 of 3 or 4 of 7. For example, if a recovery key is split into seven parts, only four of those are needed to create the recovery key that will decrypt the backup of the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Put the steps of the certificate life cycle in the following list in their correct order:

Certificate is published.

Certificate is expired.

Certificate is received.

Certificate is requested.

A

4, 1, 3, 2

Within the given steps of the certificate life cycle, the certificate would be requested, published, received, and then expired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have been tasked with contacting your certificate authority and revoking your company’s current web server certificate. Which of the following is the most likely reason to revoke the certificate?

You renewed your certificate after it expired.

The previous network administrator who created the certificate was fired.

You installed a new web server.

A

The previous network administrator who created the certificate was fired.

The certificate should be revoked because the user assigned to that certificate is no longer with the company. This prevents the user from continuing to use that certificate for encryption and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to look up the details of a certificate that was revoked. Where can you find this information?

Certificate Expiry List

Registration Suspension List

Certificate Revocation List

A

Certificate Revocation List

A Certificate Revocation List (CRL) is published by a CA to show certificates that have been revoked. A verifier can examine the list to check the validity of another user’s certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to renew your company’s certificate for its public web server. When should you renew the certificate?

On its expiry date

After it’s revoked

Thirty days before expiry

A

Thirty days before expiry

Most certificate authorities require that a certificate be renewed within a certain amount of time before the actual expiry date. This provides the CA with enough time to renew the certificate and deliver it back to the client for distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OCSP _____ improves upon the original OCSP efficiency by including a time-stamped, signed response with the TLS/SSL handshake.

pinning

stapling

assigning

A

stapling

The TLS Certificate Status Request extension, more commonly known as OCSP stapling, further improves efficiency by allowing the certificate holder to query the OCSP responder itself at set intervals and including (“stapling”) the signed response with the TLS/SSL handshake, rather than query the OCSP responder each time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly