Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
All of the following are asymmetric encryption algorithms EXCEPT: |
3DES |
|
The process for protecting intellectual property from unauthorized used is called |
Digital rights management |
|
When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of |
Nonrepudiation |
|
Keeping a copy of an encryption key with a trusted third party is known as |
Key escrow |
|
Cryptography can be used to protect confidentiality and integrity as well as to implement nonrepudiation, authentication, key escrow, digital signatures, and digital rights management. |
True |
|
How is an outsourced CA different from a public CA? |
An outsourced CA provides dedicated services, and possibly equipment, to an individual company. |
|
It is easier to implement, back up, and recover keys in a |
Centralized infrastructure |
|
A trust domain is defined as |
A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection |
|
All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT: |
Make copies of the private key and keep it in several locations for redundancy. |
|
Which of the following reasons would be appropriate for a certificate suspension rather than revocation? |
An extended vacation |
|
The difference between centralized and decentralized infrastructures is |
The location where the cryptographic key is generated and stored is different. |
|
All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT: |
The key should be shared only with others you trust. |
|
"Digital certificate" and "private key" are two different terms for the same thing. |
False |
|
A digital certificate binds an individual's identity to a public key. |
True |
|
A(n) _______________ certificate is used when independent CAs establish peer-to-peer trust relationships. |
Cross-certification |
|
An in-house certificate authority is |
A CA that is maintained and controlled by the company that implemented it |
|
The list of certificates that have been revoked is called the _______________. |
Certificate revocation list |
|
Which of the following is NOT one of the three forms of trust models? |
Star |
|
Requiring two individuals to recover a lost key together is called |
Dual control |
|
If the root CA's private key were compromised, what would happen? |
Subordinate CAs and end users would be affected. |