public key infrastructure Flashcards

1
Q

A _____ is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.

A

certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An _____ can be used to sign and encrypt email messages, typically using S/MIME or PGP. The user’s email address must be entered in the Subject Alternative Name (SAN) extension field

A

email certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ is issued to a software publisher, following some sort of identity check and validation process by the CA.

A

code signing certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ may be issued to network appliances, such as routers, switches, and firewalls.

A

Machine certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the components of a three-level Certificate Authority (CA) hierarchy?

A

Root, Intermediate, and Issuing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ______ describes a certificate used with multiple sub-domains of a domain. They are represented with an asterisk (*) such as *.google.com.

A

wildcard certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is an extension field on a web server certificate and supports the identification of the server by multiple subdomain labels.

A

Subject Alternative Name (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ allow for users to trust a public website using a chain of trust to the root authority.

A

Public root certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A DER-encoded binary file can be represented as ASCII characters using Base64 ______ encoding. ___ files support other extensions like .key, .cer, and .cert.

A

Privacy-enhanced Electronic Mail (PEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All certificates use an encoding scheme called _____ to create a binary representation of the information in the certificate. It does not use a Base64 encoding.

A

Distinguished Encoding Rules (DER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ____ format allows the export of a certificate along with its private key. This would be used to archive or transport a private key.

A

.pfx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ___ file is a password-protected container format that possibly contains private/public key pairs.

A

.p12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ___ format is a means of bundling multiple certificates in the same file, often often used to deliver a chain of certificates. ___ files do not contain the private key.

A

P7B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ involve wide needs, such as standard users, administrators, smart card login/users, recovery agent users, and Exchange mail users

A

User certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is proving the ownership of a domain, which may be proved by responding to an email to the authorized point of contact. This process is highly vulnerable to compromise.

A

Domain Validation (DV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ is a process requiring more rigorous checks on the subject’s legal identity and control over the domain or software being signed.

A

Extended Validation (EV)

17
Q

A _____ is a server assigned the task of completing an identity check and submitting Certificate Signing Requests (CSRs) on behalf of end users

A

registration authority

18
Q

_____ refers to several techniques to ensure it is inspecting the proper certificate when a client inspects the certificate presented by a server or a code-signed application.

A

Certificate Pinning

19
Q

_____ refers to the archiving of a key (or keys) with a third party.

A

Key escrow

20
Q

A _____ must be completed by a subject who wants to obtain a certificate from a Certificate Authority (CA).

A

Certificate Signing Request (CSR)

The CSR is a Base64 ASCII file containing information about the requester including its public key.

21
Q

A _____ is a list of certificates that were revoked before their expiration date.

A

Certificate Revocation List (CRL)

22
Q

______ is a service that runs on an issuing Certificate Authority (CA) designated as an ____ responder to communicate the status of requested certificates, rather than returning a CRL.

A

Online Certificate Status Protocol (OCSP)

23
Q

The _____ is a concept of the Public Key Infrastructure (PKI) to show how users and different Certificate Authorities (CA) can trust one another.

A

trust model

24
Q

______ is a method of trusting digital certificates to bypass the CA hierarchy and chain of trust and minimize MitM attacks. The client stores a public key that belongs (or is pinned) to a web server. If visiting again and the key does not exist in the certificate chain, a warning is presented.

A

HTTP Public Key Pinning (HPKP)