SEC+ Revision Questions Managing a PKI Infrastructure Flashcards

1
Q

After importing a user certificate file to an e-mail program, a user finds she cannot digitally sign sent e-mail messages. What are some possible reasons for this? (Choose two.)
A. The public key is not in the certificate.
B. The private key is not in the certificate.
C. The certificate was not created for e-mail usage.
D. The PKI is not in the certificate.

A

B. The private key is not in the certificate.
&
C. The certificate was not created for e-mail usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would not be found in a digital certificate?
A. Public key
B. Private key
C. Digital signature of issuing CA
D. IP address of PKI server

A

D. IP address of PKI server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are providing consulting services to a legal firm that has a PKI. They would like to enable document workflow where documents are sent electronically to the appropriate employees within the firm. You are asked whether there is a way to prove that documents were sent from the user listed in the From field. Of the following, what would you recommend?
A. File encryption
B. Digital signatures
C. E-mail encryption
D. Certificate revocation list

A

B. Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As a security auditor, you are focusing on hardening an existing PKI. Which of the following should you consider? (Choose two.)
A. Take the CA offline.
B. Do not make public keys publicly accessible.
C. Configure a recovery agent.
D. Encrypt all digital certificates.

A

A. Take the CA offline.
&
C. Configure a recovery agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your colleagues report that there is a short time frame where a revoked certificate can still be used. Why is this?
A. The CRL is published periodically.
B. The CRL is published immediately but must replicate to all hosts.
C. The CRL lists only revoked certificate serial numbers; it is not used in any way.
D. The CRL is dependent on network bandwidth.

A

A. The CRL is published periodically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes the term key escrow?
A. A trusted third party with decryption keys in case the original keys have expired
B. A trusted third party with decryption keys in addition to existing original keys
C. An account that can be used to encrypt private keys
D. An account that can be used to encrypt data for any user

A

B. A trusted third party with decryption keys in addition to existing original keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which PKI component verifies the identity of certificate requestors before a certificate is issued?
A. Public key
B. RA
C. PKI
D. CRL

A

B. RA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user reports that they are unable to authenticate to the corporate VPN while traveling. You have configured the VPN to require X.509 user certificate authentication. After investigating the problem, you learn that the user certificate has expired. Which of the following presents the quickest secure solution?
A. Create a new user certificate and configure it on the user computer.
B. Disable X.509 certificate authentication for your VPN.
C. Reduce the CRL publishing frequency.
D. Set the date back on the VPN appliance to before the user certificate expired.

A

A. Create a new user certificate and configure it on the user computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When users connect to an intranet server by typing https://intranet.acme.local, their web browser displays a warning message stating the site is not to be trusted. How can this warning message be removed while maintaining security?
A. Configure the web server to use HTTP instead of HTTPS.
B. Install the intranet server private key on all client workstations.
C. Use TCP port 443 instead of TCP port 80.
D. Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.

A

D. Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An HTTPS-secured web site requires the ability to restrict which workstations can make a connection. Which option is the most secure?
A. Configure the web site to allow connections only from the IP addresses of valid workstations.
B. Configure the web site to allow connections only from the MAC addresses of valid workstations.
C. Configure the web site to use user authentication.
D. Configure the web site to require client-side certificates.

A

D. Configure the web site to require client-side certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is untrue regarding certificates containing private keys?
A. They can be used to encrypt mail sent to others.
B. They can be used to encrypt hard disk contents.
C. They should be password protected.
D. They can be used to digitally sign mail sent to others.

A

A. They can be used to encrypt mail sent to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For which purpose would a computer digital certificate be used? (Choose the best answer.)
A. Network access control
B. IPSec
C. Both of the above
D. Neither of the above

A

C. Both of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are responsible for enabling SSL on an e-commerce web site. What should you do first?
A. Install the web server digital certificate.
B. Enable SSL on the web server.
C. Create a CSR and submit it to a CA.
D. Configure the web server to use port 443.

A

C. Create a CSR and submit it to a CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

While generating a certificate signing request for a web site, you enter the information listed here. Users will connect to the web site by typing https://www.acme.com. Identify the configuration error.
Expiry: 12 months
Bit length: 2048
Common Name: 215.66.77.88 Organization: Acme Inc.
OU: Sales Country: US State: TN City: Memphis
A. The expiry date is one year away.
B. The bit length should be 128.
C. The common name should be www.acme.com.
D. The State field must not be abbreviated.

A

C. The common name should be www.acme.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A national company with headquarters in Dallas, Texas, is implementing a PKI. There are corporate locations in 12 other major U.S. cities. Each of those locations has a senior network administrator. Which option presents the best PKI solution?
A. Install a root CA in Dallas. Create subordinate CAs for each city and use these to issue certificates for users and computers in that city. Take the root CA offline.
B. Install a root CA in Dallas. Issue certificates for users and computers in all locations.
C. Install a root CA in Dallas. Issue certificates for users and computers in all locations. Take the root CA offline.
D. Install a root CA in Dallas and each city. Issue certificates for users and computers using each city root CA. Take the root CAs offline.

A

A. Install a root CA in Dallas. Create subordinate CAs for each city and use these to issue certificates for users and computers in that city. Take the root CA offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A work colleague has sent you a digital certificate file to install on your computer so that you can encrypt e-mail messages to him. What error was made in Figure 13-2 when the file was generated?
A. There should not be a private key password.
B. A private key should never be shared with others.
C. The option Enable Strong Private Key Protection must be enabled.
D. The option Include All Extended Properties must be disabled.

A

B. A private key should never be shared with others.

17
Q

To secure your server, you would like to ensure server hard disk data cannot be accessed if the hard disks are stolen. What should you do?
A. Configure EFS.
B. Configure TPM with PKI encryption keys.
C. Configure NTFS security.
D. Configure a power-on password.

A

B. Configure TPM with PKI encryption keys.

18
Q

Which security objectives are met by PKI? (Choose two.)
A. Least privilege
B. Integrity
C. Nonrepudiation
D. DMZ

A

B. Integrity
&
C. Nonrepudiation

19
Q

Your company, Acme, Inc., conducts business with a supplier, Widgets, Inc. Both companies have an existing PKI with departmental subordinate CAs. Certain Widgets departments require access to specific secured Acme web servers that require client-side certificates before access is granted. What solution should you propose?
A. Acme administrators should create a new root CA for Widgets and issue certificates to those employees needing access to the Acme web server.
B. Acme administrators should create a new subordinate CA for Widgets and issue certificates to those employees needing access to the Acme web server.
C. The Acme web servers should be cross-certified with the appropriate Widgets subordinate CAs.
D. The appropriate Widgets and Acme departmental CAs should be cross-certified.

A

C. The Acme web servers should be cross-certified with the appropriate Widgets subordinate CAs.

20
Q

Which types of keys are commonly used for e-commerce web sites?
A. Public, private, session
B. Public and private
C. Public, private, TPM
D. Public, private, PKI

A

A. Public, private, session

21
Q

The CA signature exists in all digital certificates that it issues. Which key does the CA use to create its signature?
A. Private
B. Public
C. Symmetric
D. Asymmetric

A

A. Private

22
Q

In a PKI, what role does the CA play? (Choose two.)
A. Revokes certificates
B. Uses its private key to digitally sign certificates
C. Uses its public key to digitally sign certificates
D. Controls access to the network using certificates

A

A. Revokes certificates
&
B. Uses its private key to digitally sign certificates

23
Q

To which does the X.509 standard apply?
A. LDAP
B. PKI certificates
C. Biometric authentication
D. A type of network transport

A

B. PKI certificates