3.9 Implement Public Key Infrastructure Flashcards

1
Q

Policies, procedures, hardware, software, and people involved in creating, distributing, and managing digital certificates.

A

Public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 steps to the Public key management lifecycle?

A
Key generation
Certificate generation
Distribution
Storage
Revocation
Expiration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the only way to trust a certificate is valid?

A

Using the digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When creating a key pair, which key would you send to the CA to be digitally signed?

A

Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of organizations almost always should have their own internal CA?

A

Medium to large organizations with 100s of servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the best way to provide redundancy to a CA infrastructure?

A

Make it hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the registration authority? (RA)

A

RA identifies and authenticates the requester

Responsible for cert revocations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The fully qualified domain name (FQDN) for a website on a certificate.

A

Common name (CN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the subject alternative name (SAN) on a website certificate?

A

additional host names for the site (i.e. www.google.com and google.com)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the CRL that is maintained by the CA?

A

Certificate revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A check that is done by your browser to check for a certificate revocation without downloading the entire CRL.

A

Online Certificate Status Protocol (OCSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The certificate that lies at the start of the PKI infrastructure. All subsequent certificates will branch off of this one.

A

Root certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When do you use self-signed certificates?

A

When you don’t need to distribute the certificate externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the standard used when working with certificates?

A

X.509 Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encoding format designed to transfer syntax for data structures, and is perfectly suited for certificates. Represented in binary format.

A

Distinguished Encoding Rules (DER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Container format for storing multiple certificates or keys in a single container. Derived from Microsoft’s .pfx format

A

PKCS #12`

17
Q

What’s the benefit for keeping one or more CAs offline?

A

Easily recover if an intermediate CA is compromised

18
Q

This provides scalability to OCSP process of certificate revocation checking. Allows OCSP status information to be sent with the SSL/TLS handshake.

A

OCSP stapling

19
Q

Process of adding a certificate or public key to an application the first time it runs so you can compare it with the cert on the server.

A

Pinning

20
Q

PGP is a web of trust. What does this mean?

A

There is no central CA. Certificates are signed and trusted within the network

21
Q

What is it called when a third party manages your private keys?

A

Key escrow

22
Q

Allows you to see and validate all certificates between the server issuing a certificate and the root CA.

A

Certificate chaining