Chapter 14 Flashcards

1
Q

public key infrastructure (PKI)

A

An entire system of hardware and software, policies
and procedures, and people, used to create, distribute, manage, store, and revoke digital
certifi cates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

X.509

A

A common PKI standard developed by the ITU-T that incorporates the single
sign-on authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

certificate authority (CA)

A
The entity (usually a server) that issues digital certifi cates to
users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

many-to-one mapping

A

When multiple certifi cates are mapped to a single recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

registration authority (RA)

A

Used to verify requests for certifi cates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

certificate revocation list (CRL)

A

A list of certifi cates no longer valid or that have been
revoked by the issuer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Online Certificate Status Protocol (OCSP)

A

An alternative to using a certifi cate
revocation list (CRL).It contains less information than a CRL does, and does not
require encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

key escrow

A

When certifi cate keys are held in case third parties, such as government or
other organizations, need access to encrypted communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key recovery agent

A

Software that can be used to archive and restore keys if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

web of trust

A

A decentralized model used for sharing certifi cates without the need for a
centralized CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure Sockets Layer (SSL)

A

A cryptographic protocol that provides secure Internet
communications such as web browsing, instant messaging, e-mail, and VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transport Layer Security (TLS)

A

The successor to SSL. Provides secure Internet communications.
This is shown in a browser as HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Shell (SSH)

A

A protocol that can create a secure channel between two computers
or network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Point-to-Point Tunneling Protocol (PPTP)

A

A tunneling protocol used to support VPNs.

Generally includes security mechanisms, and no additional software or protocols need to
be loaded.

A VPN device or server must have inbound port 1723 open to enable incoming
PPTP connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internet Protocol Security (IPsec)

A

A TCP/IP protocol that authenticates and encrypts
IP packets, effectively securing communications between computers and devices using
the protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly