• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
1 CH9
PKI (Public Key Infrastructure) is a key-asymmetric system utilizing how many keys?
1
A) One
B) Two
C) Three
D) Four
1 B
PKI (Public Key Infrastructure) is a key-asymmetric system utilizing two keys.
2 CH9
te authority (CA) is an organization that is responsible for issuing, revoking, and distributing:
2
A) Tokens
B) Licenses
C) Certificates
D) Tickets
2 C
A certificate authority (CA) is an organization that is responsible for issuing, revoking, and distributing certificates.
3 CH9
A registration authority (RA) can do all the following except:
3
A) Distribute keys
B) Accept registrations for the CA
C) Validate identities
D) Give recommendations
3 D
A registration authority (RA) can distribute keys, accept registrations for the CA, and validate identities. It cannot give recommendations.
4 CH9
The primary difference between an RA and _____ is that the latter can be used to identify or establish the identity of an individual.
4
A) MLA
B) STR
C) BSO
D) LRA
4 D
The primary difference between an RA and LRA is that the LRA can be used to identify or establish the identity of an individual.
5 CH9
The most popular certificate used is version 3 of:
5
A) X.509
B) B.102
C) C.409
D) Z.602
5 A
The most popular certificate used is version 3 of X.509.
6 CH9
The process of requiring interoperability is called:
6
A) Cross examination
B) Cross certification
C) Cross scoping
D) Cross marking
6 B
The process of requiring interoperability is called cross certification.
7 CH9
A Certificate Practice Statement (CPS) is a detailed statement the CA uses to issue certificates and _____ of the CA.
7
A) Implement policies
B) Control processes
C) Regulate actions
D) Complete processes
7 A
A Certificate Practice Statement (CPS) is a detailed statement the CA uses to issue certificates and implement policies of the CA.
8 CH9
Certificate revocation is the process of revoking a certificate before it:
8
A) Is renewed
B) Becomes public
C) Reuses a value
D) Expires
8 D
Certificate revocation is the process of revoking a certificate before it expires.
9 CH9
Which of the following is not one of the four main types of trust models used with PKI?
9
A) Hierarchical
B) Bridge
C) Custom
D) Mesh
E) Hybrid
9 C
The four main types of trust models used with PKI are hierarchical, bridge, mesh, and hybrid. Custom is not one of the main PKI trust models.
10 CH9
Which of the following refers to the ability to manage individual resources in the CA network?
10
A) Regulation
B) Granularity
C) Management
D) Restricting
10 B
Granularity refers to the ability to manage individual resources in the CA network.
11 CH9
A hierarchical trust model is also known as a:
11
A) Bush
B) Branch
C) Tree
D) Limb
11 C
A hierarchical trust model is also known as a tree.
12 CH9
In a bridge trust model, a ___ to ____ relationship exists between the root CAs.
12
A) Parent, child
B) Peer, peer
C) Father, daughter
D) Sister, parent
12 B
In a bridge trust model, a peer-to-peer relationship exists between the root CAs.
13 CH9
The mesh trust model is also known as what?
13
A) Web structure
B) Car model
C) Web redemption
D) Corrupt system
13 A
The mesh trust model is also known as a web structure.
14 CH9
Key management includes all of the following stages/areas except:
14
A) Centralized versus decentralized key generation
B) Key storage and distribution
C) Key locking
D) Key escrow
E) Key expiration
14 C
Key management includes centralized versus decentralized key generation, key storage and distribution, key escrow, and key expiration. Key locking is not a part of key management.
15 CH9
Key destruction is the process of destroying keys that have become:
15
A) Invalid
B) Expired
C) Ruined
D) Outdated
15 A
Key destruction is the process of destroying keys that have become invalid.
16 CH9
Public Key Infrastructure (PKI) is a first attempt to provide all the aspects of security to messages and transactions that have been previously discussed. It contains four components including:
16
A) Certificate Authority (CA), Registration Authority (RA), RSA, and digital certificates
B) Certificate Authority (CA), RSA, Document Authority (DA), and digital certificates
C) Document Authority (DA), Certificate Authority (CA), and RSA
D) Registration Authority (RA), RSA, and digital certificates
16 A
Public Key Infrastructure (PKI) contains four components: certificate authority (CA), registration authority (RA), RSA, and digital certificates.
17 CH9
Which of the following is responsible for issuing certificates?
17
A) Registration authority (RA)
B) Certificate authority (CA)
C) Document authority (DA)
D) Local registration authority (LRA)
17 B
The certificate authority (CA) is responsible for issuing certificates.
18 CH9
In a bridge trust model, each intermediate CA trusts only those CAs that are:
18
A) Above and below it
B) Above it
C) Below it
D) On the same level
18 A
In a bridge trust model, each intermediate CA trusts those CAs that are above and below it.
19 CH9
Which of the following is an attack against the algorithm?
19
A) Birthday attack
B) Weak key attack
C) Mathematical attack
D) Registration attack
19 C
A mathematical attack is an attack against the algorithm.
20 CH9
One disadvantage of decentralized key generation is:
20
A) It depends on key escrow.
B) It is more vulnerable to single point attacks.
C) There are more risks of attacks.
D) It creates a storage and management issue.
20 D
A disadvantage of decentralized key generation is the storage and management issue it creates.