quiz 13 Flashcards
Most PKIs use a web of trust model.
False—Most PKIs are centralized, using a central certificate authority.
PKIs manage, store, and revoke digital certificates.
True—Public-key infrastructures are an entire system of hardware and software used to create, distribute, manage, store, and revoke digital certificates.
If a key pair is generated at a local computer, it is considered to be de-centralized.
True—If the key pair is generated at a local computer, it is decentralized, and the keys are not distributed.
Certificates are digitally signed electronic documents that bind a private key with a user identity.
False—Certificates are digitally signed electronic documents that bind a public key with a user identity.
Most certificates are based on the X.509 standard.
True—X.509 is a common PKI standard that incorporates the single sign-on authentication method.
What is a certificate added to when it is considered to be no longer valid? A. Key escrow B. CRL C. CA D. RA
B. When a certificate is no longer considered to be valid, it is added to the certificate revocation list (CRL).
Which of the following is best described as when certificate keys are held in the case that third parties such as government or other organizations need access to encrypted communications? A. Key escrow B. CRL C. CA D. RA
A. Key escrow is when certificate keys are held by third parties, such as governments or other organizations.
Which type of certificate is most commonly used by communications sessions? A. Single-sided certificate B. Dual-sided certificate C. Web of trust D. Certificate authority
A. The single-sided certificate is the most commonly used certificate within communications sessions, such as secure web sessions.
Which of the following scenarios would not use a PKI? A. E-commerce and web logins B. Email and other communications C. Symmetric key algorithms D. Virtual private networks
C Symmetric key algorithms don’t use a PKI. PKIs usually use a symmetric key algorithms but can use symmetric key algorithms as well.
Which of the following is used to secure L2TP sessions? A. S/MIME B. PPTP C. SSH D. IPsec
D. IPsec is an encryption protocol that can secure L2TP VPN sessions.