• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

All of the following are asymmetric encryption algorithms EXCEPT:

3DES

The process for protecting intellectual property from unauthorized used is called

Digital rights management

When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of

Nonrepudiation

Keeping a copy of an encryption key with a trusted third party is known as

Key escrow

Cryptography can be used to protect confidentiality and integrity as well as to implement nonrepudiation, authentication, key escrow, digital signatures, and digital rights management.

True

How is an outsourced CA different from a public CA?

An outsourced CA provides dedicated services, and possibly equipment, to an individual company.

It is easier to implement, back up, and recover keys in a

Centralized infrastructure

A trust domain is defined as

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT:

Make copies of the private key and keep it in several locations for redundancy.

Which of the following reasons would be appropriate for a certificate suspension rather than revocation?

An extended vacation

The difference between centralized and decentralized infrastructures is

The location where the cryptographic key is generated and stored is different.

All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT:

The key should be shared only with others you trust.

"Digital certificate" and "private key" are two different terms for the same thing.

False

A digital certificate binds an individual's identity to a public key.

True

A(n) _______________ certificate is used when independent CAs establish peer-to-peer trust relationships.

Cross-certification

An in-house certificate authority is

A CA that is maintained and controlled by the company that implemented it

The list of certificates that have been revoked is called the _______________.

Certificate revocation list

Which of the following is NOT one of the three forms of trust models?

Star

Requiring two individuals to recover a lost key together is called

Dual control

If the root CA's private key were compromised, what would happen?

Subordinate CAs and end users would be affected.