public key infrastructure Flashcards
A _____ is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
certificate authority (CA)
An _____ can be used to sign and encrypt email messages, typically using S/MIME or PGP. The user’s email address must be entered in the Subject Alternative Name (SAN) extension field
email certificate
A _____ is issued to a software publisher, following some sort of identity check and validation process by the CA.
code signing certificate
_____ may be issued to network appliances, such as routers, switches, and firewalls.
Machine certificates
What are the components of a three-level Certificate Authority (CA) hierarchy?
Root, Intermediate, and Issuing
A ______ describes a certificate used with multiple sub-domains of a domain. They are represented with an asterisk (*) such as *.google.com.
wildcard certificate
_____ is an extension field on a web server certificate and supports the identification of the server by multiple subdomain labels.
Subject Alternative Name (SAN)
______ allow for users to trust a public website using a chain of trust to the root authority.
Public root certificates
A DER-encoded binary file can be represented as ASCII characters using Base64 ______ encoding. ___ files support other extensions like .key, .cer, and .cert.
Privacy-enhanced Electronic Mail (PEM)
All certificates use an encoding scheme called _____ to create a binary representation of the information in the certificate. It does not use a Base64 encoding.
Distinguished Encoding Rules (DER)
The ____ format allows the export of a certificate along with its private key. This would be used to archive or transport a private key.
.pfx
The ___ file is a password-protected container format that possibly contains private/public key pairs.
.p12
The ___ format is a means of bundling multiple certificates in the same file, often often used to deliver a chain of certificates. ___ files do not contain the private key.
P7B
_____ involve wide needs, such as standard users, administrators, smart card login/users, recovery agent users, and Exchange mail users
User certificates
_____ is proving the ownership of a domain, which may be proved by responding to an email to the authorized point of contact. This process is highly vulnerable to compromise.
Domain Validation (DV)