Public Key Infrastructure Flashcards

Security+

1
Q

What is PKI?

A

A framework consisting of policies, procedures, hardware, software, and people to manage digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the main functions of digital certificates in PKI?

A

Create, distribute, manage, store, and revoke.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is planning important in PKI?

A

Because implementing PKI is a complex endeavor that requires significant preparation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does PKI bind public keys to?

A

Individuals or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of a certificate authority in PKI?

A

It issues and manages digital certificates, establishing trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption?

A

A method that uses a single shared key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens if the symmetric key gets compromised?

A

A new key will need to be generated and distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why doesn’t symmetric encryption scale well?

A

Because it can be challenging to distribute the shared key securely among many users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an advantage of symmetric encryption?

A

It is fast and has less overhead compared to asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is symmetric encryption often used in practice?

A

It is commonly combined with asymmetric encryption for efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What defines asymmetric encryption?

A

It uses two (or more) mathematically related keys: a private key and a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a private key in asymmetric encryption?

A

It must be kept secret and is used to decrypt data encrypted with the corresponding public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can anyone do with a public key?

A

They can view and distribute it freely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can the private key be derived from the public key?

A

No, it is mathematically infeasible to derive the private key from the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a key pair generated in asymmetric encryption?

A

Both the public and private keys are built simultaneously using randomization and mathematical algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is key escrow?

A

A process where a third party holds your private keys for decryption.

17
Q

Why might key escrow be a legitimate business arrangement?

A

Businesses or government agencies may need access to encrypted information for compliance or operational needs.

18
Q

What are the concerns regarding key escrow?

A

It can be controversial due to privacy and security implications.

19
Q

What is essential for managing keys in PKI?

A

Clear processes and procedures to ensure trust and control over access to keys.

20
Q

Under what conditions might a third party access encryption keys?

A

In controlled situations like legal proceedings or court orders.