Security Module 6 Flashcards

1
Q

Where are private keys NOT stored?

A

Within digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A hierarchical trust model signs digital certificate authorities with how many keys?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does an attacker successfully alter a message that was sent with a digital certificate?

A

By intercepting a message, creating imposter keys, and sending the modified message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public Key Cryptography Standards are based on which of the following?

A

RSA public key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PKI consists of all of the following EXCEPT what?

A

Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following does a digital certificate NOT contain?

A

The hard-coded MAC address of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is concerning about entry-level certificates?

A

The only authenticate that an institution has a specific domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following sis used to digitally sign a certificate?

A

CA Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can an EV SSL help users avoid dangerous sites?

A

By displaying the address bar in red.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following explains the importance of a “Facilitator”?

A

A facilitator interconnects CAs within a bridge trust model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of suspending a digital certificate rather than revoking it?

A

To limit use of a certificate after an employee temporarily leaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is provided by a server digital certificate?

A

Authentication of the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is involved in key escrow?

A

The key is split in two halves, then encrypted by a third part

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why would an administrator NOT renew a key?

A

Renewing keys continues their lifespan, making them less reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a browser cannot connect to the OSCP responder, what does the browser receive in return.

A

Soft-fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is a pre-master secret an important component of a web browser and web server handshake?

A

The pre-master secret is used to create a master key, which can then create session keys for symmetric encryption.

17
Q

What is the biggest differences between a CA and an RA?

A

Certificate Authorities can generate public key certificates

18
Q

How are TLS and SSL currently different in regards to security?

A

TLS v1.2 us considered more secure than any version of SSL

19
Q

On which of the following devices is IPsec likely to be implemented?

A

Router

20
Q

Why would an administrator choose to use multiple Registration Authorities when processing certificate requests?

A

Using one CA can be inconvenient when entities are located in different geographical areas.