quiz 13 Flashcards

1
Q

Most PKIs use a web of trust model.

A

False—Most PKIs are centralized, using a central certificate authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PKIs manage, store, and revoke digital certificates.

A

True—Public-key infrastructures are an entire system of hardware and software used to create, distribute, manage, store, and revoke digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If a key pair is generated at a local computer, it is considered to be de-centralized.

A

True—If the key pair is generated at a local computer, it is decentralized, and the keys are not distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates are digitally signed electronic documents that bind a private key with a user identity.

A

False—Certificates are digitally signed electronic documents that bind a public key with a user identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most certificates are based on the X.509 standard.

A

True—X.509 is a common PKI standard that incorporates the single sign-on authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What is a certificate added to when it is considered to be no longer valid? 
A. Key escrow 
B. CRL 
C. CA 
D. RA
A

B. When a certificate is no longer considered to be valid, it is added to the certificate revocation list (CRL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following is best described as when certificate keys are held in the case that third parties such as government or other organizations need access to encrypted communications? 
A. Key escrow 
B. CRL 
C. CA 
D. RA
A

A. Key escrow is when certificate keys are held by third parties, such as governments or other organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which type of certificate is most commonly used by communications sessions? 
A. Single-sided certificate 
B. Dual-sided certificate 
C. Web of trust 
D. Certificate authority
A

A. The single-sided certificate is the most commonly used certificate within communications sessions, such as secure web sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following scenarios would not use a PKI? 
A. E-commerce and web logins 
B. Email and other communications 
C. Symmetric key algorithms 
D. Virtual private networks
A

C Symmetric key algorithms don’t use a PKI. PKIs usually use a symmetric key algorithms but can use symmetric key algorithms as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is used to secure L2TP sessions? 
A. S/MIME 
B. PPTP 
C. SSH 
D. IPsec
A

D. IPsec is an encryption protocol that can secure L2TP VPN sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly