Public Key Infrastructure Flashcards

1
Q

What is the first step in getting a certificate from a Certificate Authority?

A

Generate a public/private key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the second step in getting a certificate from a Certificate Authority?

A

Generate a certificate signing request (CSR). Providing identity information is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do Extended Validated Certificates require to be verified?

A

Legal and proper standings of the organisation; verify the operational existence + everything OV requires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between EV and OV?

A

EV requires extensive verification, OV does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a root CA become verified?

A

It self signs itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does PKI defeat MITM attack? e.g. attacker forwards the authentic certificate from example.com

A

Attacker does not know corresponding private key, therefore cannot know the secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does MITM attack public key encryption?

A

By providing the attackers own public key instead of the servers public key to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly