SEC+ Revision Questions Managing a PKI Infrastructure Flashcards
After importing a user certificate file to an e-mail program, a user finds she cannot digitally sign sent e-mail messages. What are some possible reasons for this? (Choose two.)
A. The public key is not in the certificate.
B. The private key is not in the certificate.
C. The certificate was not created for e-mail usage.
D. The PKI is not in the certificate.
B. The private key is not in the certificate.
&
C. The certificate was not created for e-mail usage.
Which of the following would not be found in a digital certificate?
A. Public key
B. Private key
C. Digital signature of issuing CA
D. IP address of PKI server
D. IP address of PKI server
You are providing consulting services to a legal firm that has a PKI. They would like to enable document workflow where documents are sent electronically to the appropriate employees within the firm. You are asked whether there is a way to prove that documents were sent from the user listed in the From field. Of the following, what would you recommend?
A. File encryption
B. Digital signatures
C. E-mail encryption
D. Certificate revocation list
B. Digital signatures
As a security auditor, you are focusing on hardening an existing PKI. Which of the following should you consider? (Choose two.)
A. Take the CA offline.
B. Do not make public keys publicly accessible.
C. Configure a recovery agent.
D. Encrypt all digital certificates.
A. Take the CA offline.
&
C. Configure a recovery agent.
Your colleagues report that there is a short time frame where a revoked certificate can still be used. Why is this?
A. The CRL is published periodically.
B. The CRL is published immediately but must replicate to all hosts.
C. The CRL lists only revoked certificate serial numbers; it is not used in any way.
D. The CRL is dependent on network bandwidth.
A. The CRL is published periodically.
Which of the following best describes the term key escrow?
A. A trusted third party with decryption keys in case the original keys have expired
B. A trusted third party with decryption keys in addition to existing original keys
C. An account that can be used to encrypt private keys
D. An account that can be used to encrypt data for any user
B. A trusted third party with decryption keys in addition to existing original keys
Which PKI component verifies the identity of certificate requestors before a certificate is issued?
A. Public key
B. RA
C. PKI
D. CRL
B. RA
A user reports that they are unable to authenticate to the corporate VPN while traveling. You have configured the VPN to require X.509 user certificate authentication. After investigating the problem, you learn that the user certificate has expired. Which of the following presents the quickest secure solution?
A. Create a new user certificate and configure it on the user computer.
B. Disable X.509 certificate authentication for your VPN.
C. Reduce the CRL publishing frequency.
D. Set the date back on the VPN appliance to before the user certificate expired.
A. Create a new user certificate and configure it on the user computer.
When users connect to an intranet server by typing https://intranet.acme.local, their web browser displays a warning message stating the site is not to be trusted. How can this warning message be removed while maintaining security?
A. Configure the web server to use HTTP instead of HTTPS.
B. Install the intranet server private key on all client workstations.
C. Use TCP port 443 instead of TCP port 80.
D. Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.
D. Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.
An HTTPS-secured web site requires the ability to restrict which workstations can make a connection. Which option is the most secure?
A. Configure the web site to allow connections only from the IP addresses of valid workstations.
B. Configure the web site to allow connections only from the MAC addresses of valid workstations.
C. Configure the web site to use user authentication.
D. Configure the web site to require client-side certificates.
D. Configure the web site to require client-side certificates.
Which of the following is untrue regarding certificates containing private keys?
A. They can be used to encrypt mail sent to others.
B. They can be used to encrypt hard disk contents.
C. They should be password protected.
D. They can be used to digitally sign mail sent to others.
A. They can be used to encrypt mail sent to others.
For which purpose would a computer digital certificate be used? (Choose the best answer.)
A. Network access control
B. IPSec
C. Both of the above
D. Neither of the above
C. Both of the above
You are responsible for enabling SSL on an e-commerce web site. What should you do first?
A. Install the web server digital certificate.
B. Enable SSL on the web server.
C. Create a CSR and submit it to a CA.
D. Configure the web server to use port 443.
C. Create a CSR and submit it to a CA.
While generating a certificate signing request for a web site, you enter the information listed here. Users will connect to the web site by typing https://www.acme.com. Identify the configuration error.
Expiry: 12 months
Bit length: 2048
Common Name: 215.66.77.88 Organization: Acme Inc.
OU: Sales Country: US State: TN City: Memphis
A. The expiry date is one year away.
B. The bit length should be 128.
C. The common name should be www.acme.com.
D. The State field must not be abbreviated.
C. The common name should be www.acme.com.
A national company with headquarters in Dallas, Texas, is implementing a PKI. There are corporate locations in 12 other major U.S. cities. Each of those locations has a senior network administrator. Which option presents the best PKI solution?
A. Install a root CA in Dallas. Create subordinate CAs for each city and use these to issue certificates for users and computers in that city. Take the root CA offline.
B. Install a root CA in Dallas. Issue certificates for users and computers in all locations.
C. Install a root CA in Dallas. Issue certificates for users and computers in all locations. Take the root CA offline.
D. Install a root CA in Dallas and each city. Issue certificates for users and computers using each city root CA. Take the root CAs offline.
A. Install a root CA in Dallas. Create subordinate CAs for each city and use these to issue certificates for users and computers in that city. Take the root CA offline.