Managing a Public Key Infrastructure Flashcards

1
Q

After importing a user certificate file to an e-mail program, a user finds she cannot digitally sign sent e-mail messages. What are some possible reasons for this? (Choose two.)

The public key is not in the certificate.

The private key is not in the certificate.

The certificate was not created for e-mail usage.

The PKI is not in the certificate.

A

The private key is not in the certificate.

The certificate was not created for e-mail usage.

A private key is used to create digital signatures, and the related public key verifies the authenticity of that signature. A certificate lacking a private key cannot be used to digitally sign e-mail messages. Depending on how the certificate file was created, the private key may have been omitted. This is sometimes done when you send your public key to another party so that they can encrypt messages to you. Certificates can be created for specific uses, such as e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would not be found in a digital certificate?

Private key

Digital signature of issuing CA

IP address of PKI server

A

IP address of PKI server

A PKI server does not write its IP address within certificates it issues; however, it does write its digital signature with a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are providing consulting services to a legal firm that has a PKI. The firm would like to enable document workflow where documents are sent electronically to the appropriate internal employees. You are asked whether there is a way to prove that documents were sent from the user listed in the From field. Of the following, what would you recommend?

File encryption

Digital signatures

E-mail encryption

A

Digital signatures

Digital signatures are created with the sender’s private key (to which only he has access) and verified with the corresponding public key. This is the best solution for workflow documents in this scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As a security auditor, you are focusing on hardening an existing PKI. Which of the following should you consider? (Choose two.)

Take the CA offline.

Do not make public keys publicly accessible.

Configure a recovery agent.

Encrypt all digital certificates.

A

Take the CA offline.

Configure a recovery agent.

The CA is used to issue and renew X.509 certificates and should be taken offline when not in use for security purposes. CAs, especially root CAs, left online present a security risk. Normally, subordinate CAs are used to issue certificates. Recovery agents have the ability to recover encrypted data when the original private key is unavailable. Failure to configure this could result in no access to important data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

our colleagues report that there is a short time frame in which a revoked certificate can still be used. Why is this?

The CRL is published periodically.

The CRL is published immediately but must replicate to all hosts.

The CRL lists only revoked certificate serial numbers and is not used in any way.

A

The CRL is published periodically.

The CRL is not published immediately; it is published either manually or on a schedule, so there may be a small time frame where revoked certificates can still be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes the term key escrow?

A trusted third party with decryption keys in case the original keys have expired

A trusted third party with copies of decryption keys in addition to existing original keys

An account that can be used to encrypt private keys

A

A trusted third party with copies of decryption keys in addition to existing original keys

Key escrow refers to a trusted third party with a copy of decryption keys. A court order may be necessary to use these keys under certain circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which PKI component verifies the identity of certificate requestors before a certificate is issued?

Public key

RA

PKI

A

RA

A registration authority (RA) is an optional PKI component that performs requestor verification before certificates are issued

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user reports that she is unable to authenticate to the corporate VPN while traveling. You have configured the VPN to require X.509 user certificate authentication. After investigating the problem, you learn that the user certificate has expired. Which of the following presents the quickest secure solution?

Create a new user certificate and configure it on the user’s computer.

Disable X.509 certificate authentication for your VPN.

Reduce the CRL publishing frequency.

A

Create a new user certificate and configure it on the user’s computer.

X.509 certificates cannot be renewed if they have expired; a new certificate must be created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When users connect to an intranet server by typing https://intranet.acme.local, their web browser displays a warning message stating the site is not to be trusted. How can this warning message be removed while maintaining security?

Configure the web server to use HTTP instead of HTTPS.

Use TCP port 443 instead of TCP port 80.

Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.

A

Install the trusted root certificate in the client web browser for the issuer of the intranet server certificate.

The web browser must trust the digital signature in the intranet web server certificate; this is the digital signature of the server certificate issuer. If a client trusts the signer, it then trusts all certificates signed by the signer—this is how the PKI hierarchical trust model works. In addition, the server certificate must be valid, meaning it must not have expired, and it must not be listed in the CRL. The subject name in the server certificate must match the URL entered by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An HTTPS-secured web site requires the ability to restrict which workstations can make a connection. Which option is the most secure?

Configure the web site to allow connections only from the MAC addresses of valid workstations.

Configure the web site to use user authentication.

Configure the web site to require client-side certificates.

A

Configure the web site to require client-side certificates.

Client-side digital certificates must be installed on each workstation to access the web site. The web server must also be configured to allow access only from workstations with appropriate certificates installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is untrue regarding certificates containing private keys?

They can be used to encrypt mail sent to others.

They can be used to encrypt hard disk contents.

They should be password protected.

A

They can be used to encrypt mail sent to others.

Private keys are not used to encrypt message to others; for that you must have the recipient’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For which purpose would a computer digital certificate be used? (Choose the best answer.)

Network access control

IPSec

Both A and B

None of the above

A

Both A and B

Computer digital certificates can be used to authenticate the computer to another device such as with an 802.1x network switch that forwards authentication requests to an authentication server (network access control). IPSec can use computer certificates to ensure secure communication takes place between network hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are responsible for enabling SSL on an e-commerce web site. What should you do first?

Install the web server digital certificate.

Enable SSL on the web server.

Create a CSR and submit it to a CA.

A

Create a CSR and submit it to a CA.

Creating a certificate signing request (CSR) and submitting it to a CA is the first step that must be completed. Be careful when filling out all fields related to the CSR; for instance, you may need to ensure that the applicant’s name matches the owner name for a DNS domain with a DNS registrar—this is called domain validation. To prove DNS domain ownership, extended validation verifies additional information such as business name, address, e-mail addresses of applications, and so on. Another consideration is whether the e-commerce site uses multiple subordinate DNS domains such as products.acme.com and services.acme.com; a wildcard certificate (*.acme.com) could be acquired instead of separate certificates. To protect multiple different domains, a subject alternative name (SAN) certificate could be used for domains such as acme.uk and acme.ca. There are various Internet certificate authorities such as VeriSign and Entrust with varying pricing structures. Then the CA digitally signed certificate must be installed on your web server. Finally, you must configure your web site to use the digital certificate. Note that using a self-signed CA and resultant certificates would require connecting devices to trust the certificate signer; public CAs are already trusted by computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A national company with headquarters in Dallas, Texas, is implementing a PKI. There are corporate locations in 12 other major U.S. cities. Each of those locations has a senior network administrator. Which option presents the best PKI solution?

Install a root CA in Dallas. Create subordinate CAs for each city and use these to issue certificates for users and computers in that city. Take the root CA offline.

Install a root CA in Dallas. Issue certificates for users and computers in all locations.

Install a root CA in Dallas. Issue certificates for users and computers in all locations. Take the root CA offline.

A

Install a root CA in Dallas. Create subordinate CAs for each city and use these to issue certificates for users and computers in that city. Take the root CA offline.

Because there is IT expertise in each city, create a subordinate CA (also called an intermediate CA) for each city and issue certificates using these CAs for their respective cities. The root CA should be taken offline for security purposes. If a single subordinate CA is compromised, you should revoke that certificate. This will invalidate all certificates issued by this CA. The other subordinate city CAs and their issued certificates would still be valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To secure your server, you would like to ensure server hard disk data cannot be accessed if the hard disks are stolen. What should you do?

Configure EFS.

Configure TPM with PKI encryption keys.

Configure NTFS security.

A

Configure TPM with PKI encryption keys.

Trusted Platform Module (TPM) is a firmware security solution that can use PKI certificate keys to encrypt and decrypt hard disk contents. TPM-encrypted disks placed in a different computer (with or without a TPM chip) are unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which security objectives are met by PKI? (Choose two.)

Least privilege

Integrity

Nonrepudiation

DMZ

A

Integrity

Nonrepudiation

Integrity proves data is authentic and came from who it says it came from. Nonrepudiation means neither party can dispute a transmission occurred or who it came from because only the owner of a private key has access to it; the private key is used to create unique digital signatures used for data integrity. Both of these are met by a PKI

17
Q

Your company, Acme, Inc., conducts business with a supplier, Widgets, Inc. Both companies have an existing PKI with departmental subordinate CAs. Certain Widgets departments require access to specific secured Acme web servers that require client-side certificates before access is granted. What solution should you propose?

Acme administrators should create a new root CA for Widgets and issue certificates to those employees needing access to the Acme web server.

Acme administrators should create a new subordinate CA for Widgets and issue certificates to those employees needing access to the Acme web server.

The Acme web servers should be cross-certified with the appropriate Widgets subordinate CAs.

A

The Acme web servers should be cross-certified with the appropriate Widgets subordinate CAs.

Cross-certifying the appropriate subordinate CAs with the correct Acme web servers would allow only required Widgets departmental users to use their existing certificates to authenticate to the Acme web servers

18
Q

Which types of keys are commonly used for e-commerce web sites?

Public, private, session

Public and private

Public, private, TPM

A

Public, private, session

The web server sends its public key to the client. The client encrypts its self-generated session key with the server public key. The server decrypts the message with its private key, thus exposing the session key to the server. The symmetric session key is then used for the remainder of the session to encrypt data

19
Q

The CA signature exists in all digital certificates that it issues. Which key does the CA use to create its signature?

Private

Public

Symmetric

A

Private

The CA’s private key creates the digital signature that exists in issued certificates

20
Q

In a PKI, what role does the CA play? (Choose two.)

Revokes certificates

Uses its private key to digitally sign certificates

Uses its public key to digitally sign certificates

Controls access to the network using certificates

A

Revokes certificates

Uses its private key to digitally sign certificates

The CA can revoke certificates that are no longer trusted, and it uses its private key to digitally sign all certificates it issues—this establishes a chain of trust

21
Q

To which of the following does the X.509 standard apply?

LDAP

PKI certificates

Biometric authentication

A

PKI certificates

The X.509 standard stems from the 1980s. It defines a hierarchy of certificate authorities that issue, renew, and revoke certificates

22
Q

You are developing Microsoft PowerShell scripts to automate network administration tasks. The .PS1 script files need to be digitally signed and trusted to run on computers in your environment. You have already acquired a code-signing PKI certificate. You need to back up your private key. Which file format should you choose during export? (Choose two.)

DER

PEM

PFX

CER

P12

P7B

A

PFX

P12

The personal information exchange format (PFX) and P12 file formats (same data, different file extensions) are often used to store private keys and should be password protected

23
Q

Which security technique associates a host with its related public key?

CRL

OSCP

Certificate pinning

A

Certificate pinning

Pinning is a technique used to associate hosts with their public keys. This can be done by client-side applications, including web browsers, that keep a copy, or a hash, of a host’s public key. This is checked by the client app when server connectivity is initiated