A sensitive connection between a client and a web server uses what class of certificate?
  • Class 2
  • expiration
  • False
  • hashing
Digital certificates cannot be used to identify objects other than users.
  • True
  • False
A trust model in which two individuals trust each other because each individually trusts a third party.
  • third-party
  • distributed trust
  • third-party trust
  • bridge trust model
Select below the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
  • Certificate practice statement (CPS)
  • Certification Authority
  • Server digital
  • CR - certificate repository
Why is IPsec considered to be a transparent security protocol?​
  • SSL
  • False
  • IPSec
  • ​IPsec is designed to not require modifications of programs, or additional training, or additional client setup
A trust model that has multiple CAs that sign digital certificates
  • third-party trust
  • bridge trust model
  • distributed trust model
  • distributed trust
When two individuals trust each other because of the trust that exists between the individuals and a separate entity, what type of trust has been established?
  • bridge trust
  • third-party trust
  • Server digital
  • third-party
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user's local system.
  • True
  • False
Select below the type of certificate that is often issued from a server to a client, with the purpose of ensuring the authenticity of the server:
  • Certification Authority
  • distributed trust
  • Server digital
  • digital certificate
Because of the limitations of a hierarchical trust model, what type of trust model is used for CAs on the Internet?
  • distributed trust
  • distributed trust model
  • bridge trust
  • third-party trust
What protocol below supports two encryption modes: transport and tunnel?
  • hashing
  • False
  • TLS
  • IPSec
The type of trust relationship that can exist between individuals or entities..
  • bridge trust
  • hashing
  • trust model
  • bridge trust model
A process in which keys are managed by a third party, such as a trusted CA.
  • key escrow
  • bridge trust model
  • expiration
  • IPSec
The vulnerability discovered in IPsec in early 2014 was nicknamed Heartbleed, due to an issue with a heartbeat extension in the protocol.
  • True
  • False
What type of cryptographic algorithm can be used to ensure the integrity of a file's contents?
  • hashing
  • Class 2
  • trust model
  • bridge trust
A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates
  • Certificate practice statement (CPS)
  • PKI - Public Key Infrastructure
  • CA - certificate authority
  • CR - certificate repository
Symmetric keys to encrypt and decrypt information exchanged during a handshake session between a web browser and web server
  • Server digital
  • session keys
  • bridge trust
  • distributed trust
A technology used to associate a user's identity to a public key, in which the user's public key is digitally signed by trusted third party..
  • CR - certificate repository
  • Server digital
  • Certification Authority
  • digital certificate
The Encapsulating Security Payload (ESP) protocol ensures IPsec's confidentiality.​
  • True
  • False
A publicly accessible centralized directory of digital certificates that can be used to view the status of a digital certificate.
  • digital certificate
  • CR - certificate repository
  • CA - certificate authority
  • Certification Authority
A trusted third-party agency that is responsible for issuing digital certificates.
  • distributed trust model
  • bridge trust model
  • CA - certificate authority
  • CR - certificate repository
A trust model with one CA that acts as a facilitator to interconnect all other CAs
  • third-party trust
  • distributed trust model
  • bridge trust
  • bridge trust model
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0