Security+ Chapter 4

24 July 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
answer
Session keys
question
Which statement is NOT true regarding hierarchical trust models?
answer
It is designed for use on a large scale.
question
An entity that issues digital certificates is a _____.
answer
Certificate Authority (CA)
question
Which digital certificate displays the name of the entity behind the website?
answer
Extended Validation (EV) Certificate
question
_____ performs a real-time lookup of a digital certificate's status.
answer
Online Certificate Status Protocol (OCSP)
question
Which trust model has multiple CAs, one of which acts as a facilitator?
answer
Bridge
question
What entity calls in crypto modules to perform cryptographic tasks?
answer
Crypto service provider
question
_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.
answer
Key escrow
question
A digital certificate associates _____.
answer
the user's identity with his public key
question
Which of these is considered the strongest cryptographic transport protocol?
answer
TLS v1.2
question
Digital certificates can be used for each of these EXCEPT _____.
answer
to verify the authenticity of the Registration Authorizer
question
Which of the following is NOT a method for strengthening a key?
answer
Variability
question
A centralized directory of digital certificates is called a(n) _____.
answer
Certificate Repository (CR)
question
Public key infrastructure (PKI) _____.
answer
is the management of digital certificates
question
_____ is a protocol for securely accessing a remote computer.
answer
Secure Shell (SSH)
question
Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?
answer
Cipher Block Chaining (CBC)
question
Which of these is NOT part of the certificate life cycle?
answer
authorization
question
A(n) _____ is a published set of rules that govern the operation of a PKI.
answer
certificate policy (CP)
question
What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?
answer
salt
question
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.
answer
digital certificate