Security Chapter 6

24 July 2022
4.7 (114 reviews)
31 test answers

Unlock all answers in this set

Unlock answers (27)
question
A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates
answer
PKI - Public Key Infrastructure
question
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
answer
Certification Authority
question
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?
answer
distributed trust
question
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?
answer
Certificate practice statement (CPS)
question
Using what mechanism below can the non-repudiation of an e-mail and it's content be enforced?
answer
Asymmetric encryption
question
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
answer
bridge trust
question
At what stage can a certificate no longer be used for any type of authentication?
answer
expiration
question
What protocol, developed by Netscape in 1994, is designed to create an encrypted data path between a client and server that could be used on any platform or operating system?
answer
SSL
question
What protocol below supports two encryption modes: transport and tunnel?
answer
IPSec
question
What cryptographic transport algorithm is considered to be significantly more secure than SSL?
answer
TLS
question
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?
answer
hashing
question
Digital certificates cannot be used to identify objects other than users.
answer
False
question
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:
answer
Server digital
question
​SSL and TLS keys of what length are generally considered to be strong?
answer
4096
question
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?
answer
third-party
question
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.
answer
True
question
A sensitive connection between a client and a web server uses what class of certificate?
answer
Class 2
question
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.​
answer
True
question
Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature.
answer
true
question
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
answer
False
question
Why is IPsec considered to be a transparent security protocol?​
answer
​IPsec is designed to not require modifications of programs, or additional training, or additional client setup
question
A trusted third-party agency that is responsible for issuing digital certificates.
answer
CA - certificate authority
question
A trust model with one CA that acts as a facilitator to interconnect all other CAs
answer
bridge trust model
question
A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by trusted third party..
answer
digital certificate
question
A trust model in which two individuals trust each other because each individually trusts a third party.
answer
third-party trust
question
The type of trust relationship that can exist between individuals or entities..
answer
trust model
question
A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate.
answer
CR - certificate repository
question
A process in which keys are managed by a third party, such as a trusted CA.
answer
key escrow
question
Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server
answer
session keys
question
A trust model that has multiple CAs that sign digital certificates
answer
distributed trust model
question
What is the name for an organization that receives, authenticates, and processes certificate revocation requests?
answer
RA - registration authority