Security Module 6 Flashcards
Where are private keys NOT stored?
Within digital certificates
A hierarchical trust model signs digital certificate authorities with how many keys?
1
How does an attacker successfully alter a message that was sent with a digital certificate?
By intercepting a message, creating imposter keys, and sending the modified message
Public Key Cryptography Standards are based on which of the following?
RSA public key algorithm
PKI consists of all of the following EXCEPT what?
Practices
Which of the following does a digital certificate NOT contain?
The hard-coded MAC address of the owner
What is concerning about entry-level certificates?
The only authenticate that an institution has a specific domain name
Which of the following sis used to digitally sign a certificate?
CA Private key
How can an EV SSL help users avoid dangerous sites?
By displaying the address bar in red.
Which of the following explains the importance of a “Facilitator”?
A facilitator interconnects CAs within a bridge trust model
What is the purpose of suspending a digital certificate rather than revoking it?
To limit use of a certificate after an employee temporarily leaves
Which of the following is provided by a server digital certificate?
Authentication of the web server
What is involved in key escrow?
The key is split in two halves, then encrypted by a third part
Why would an administrator NOT renew a key?
Renewing keys continues their lifespan, making them less reliable
If a browser cannot connect to the OSCP responder, what does the browser receive in return.
Soft-fail