• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

What is a certificate?

An electronic file that stores public (and some times the private keys) and binds the public key to its entity (owner).

  1. The recipient's public key is used to?
  2. The recipient's private key is used to?
  1. Encrypt data or a message.
  2. Decrypt the data or message.

What are the two function of private keys?

  1. To decrypt received message or data
  2. To sign the senders message for non-repudiation

What nine values are contained in the digital certificate?

  1. Public Key: of owner
  2. Algorithm: asymmetric algorithm used
  3. Serial number: unique ID
  4. Subject: name of owner
  5. Issuer: name of issuer (root CA)
  6. Valid from: start date
  7. Valid from: End date
  8. Thumbprint algorithm: algorithm of hash
  9. Thumbprint: hash value

Who signs the Certificate?

The Certificate Authority that issued it.

What are the two types of Certificate Authorities

  1. Public CA
  2. Private CA

Once a Subordinate CA is created for each location what should happen to the Root CA.

The Root CA should be powered off so that is not compromised.

A PKI is made up of what?

A Root CA and Subordinate CAs.

Registration Authority is responsible for?

Accepting certificate requests from clients and then validating the entity requesting the certificate.

What does the Repository (LDAP-compliant directory) store?

  1. Certificates
  2. Public Keys

What are the five stages of the Certificate Life Cycle?

  1. Request
  2. Certificate
  3. Renewal
  4. Suspension and Revocation
  5. Destruction

What is the CRL?

Certificate Revocation List (CRL) that is checked by applications to verify that right of use.

What is the OSCP?

Online Certificate Status Protocol (OSCP) that uses HTTP to communicate with the CA and check status of certificate.

Explain the Recovery Agent?

The Recovery Agent is an individual or group that the can decrypt information when necessary

How do PKIs deal with key recovery/

  1. Using Key Archiving
  2. Key recover policy
  3. M of N control minimum number of employees out of the possible number of employees.

A key Escrow is?

The process of handing cryptography key over to a third party.

Trust Certificates (Cross Certificates) are used in place of what?

Keys so that keys do not have to be created between businesses.

What is the Trust Path?

When a CA that issued a certificate to a subordinate CA (the root CA) is validated.

What are the five steps SSL enabled web sites clients take to connect to the web site?

  1. Send request to port 443
  2. Server sends the public key to client
  3. The Client validates the key
  4. The Client creates a symmetric (session key) which encrypts the web page content and the symmetric key is encrypted with the public key
  5. The web server decrypts the symmetric key which is used to encrypt client/ server traffic

How do Digital Signatures Work?

  1. A message digest (hash value) is created
  2. The message digest is encrypted by sender's private key and sent
  3. The sender's public key is used to decrypt the message
  4. The receiver creates a new message digest which is validated by sender message digest.

Name three issues that have to be handled when creating PKIs?

  1. Renewal
  2. Issuing CA identifying trusted users
  3. Subject Name names mismatched

Registration Authority involves three things?

  1. Policy for requesting certificates
  2. Outline you can request certificates
  3. Type of validation on the request