ITN_260 Chapter 6

25 July 2022
4.7 (114 reviews)
24 test answers

Unlock all answers in this set

Unlock answers (20)
question
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs? a. bridge trust b. distributed trust c. third-party trust d. transitive trust
answer
bridge trust
question
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet? a. related trust b. third-party trust c. distributed trust d. managed trust
answer
distributed trust
question
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol. True False
answer
False
question
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as? a. Certificate policy (CP) b. Access policy (AP) c. Lifecycle policy (LP) d. Certificate practice statement (CPS)
answer
Certificate practice statement (CPS)
question
What is the name for an organization that receives, authenticates, and processes certificate revocation requests? a. Intermediate Authority b. Repudiation Authority c. Certificate Authority d. Registration Authority
answer
Registration Authority
question
A framework for all of the entities involved in digital certificates for digital certificate management is known as: a. Shared key infrastructure b. Private key infrastructure c. Public key infrastructure d. Network key infrastructure
answer
Public key infrastructure
question
A sensitive connection between a client and a web server uses what class of certificate? a. Class 2 b. Class 1 c. Class 3 d. Class 4
answer
Class 2
question
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates: a. Participation Authority b. Registration Authority c. Certification Authority d. Delegation Authority
answer
Certification Authority
question
The process by which keys are managed by a third party, such as a trusted CA, is known as? a. Key destruction b. Key management c. Key renewal d. Key escrow
answer
Key escrow
question
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system? a. TLS b. SSL c. EAP d. PEAP
answer
SSL
question
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.​ True False
answer
True
question
Digital certificates cannot be used to identify objects other than users. True False
answer
False
question
Using what mechanism below can the non-repudiation of an e-mail and it's content be enforced? a. Private encryption b. Elliptic encryption c. Symmetric encryption d. Asymmetric encryption
answer
Asymmetric encryption
question
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system. True False
answer
True
question
What cryptographic transport algorithm is considered to be significantly more secure than SSL? a. TLS b. ESSL c. AES d. HTTPS
answer
TLS
question
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established? a. web of b. third-party c. distributed d. mutual
answer
third-party
question
What is the name for an organization that receives, authenticates, and processes certificate revocation requests? a. Intermediate Authority b. Registration Authority c. Repudiation Authority d. Certificate Authority
answer
Registration Authority
question
At what stage can a certificate no longer be used for any type of authentication? a. suspension b. expiration c. creation d. revocation
answer
expiration
question
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server: a. Private digital b. Personal digital c. Public digital d. Server digital
answer
Server digital
question
Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature. True False
answer
True
question
What kind of certificate is typically used by an individual to secure e-mail transmissions? a. Server digital b. Personal digital c. Public digital d. Private digital
answer
Personal digital
question
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol. True False
answer
False
question
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?​ a. ​SSL b. ​TLS 3.0 c. GPG d. ​IPSec
answer
​IPSec
question
​SSL and TLS keys of what length are generally considered to be strong? a. ​4096 b. ​2048 c. ​1024 d.​128
answer
​4096