Security+ Chapter 4

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Session keys

Which statement is NOT true regarding hierarchical trust models?

It is designed for use on a large scale.

An entity that issues digital certificates is a _____.

Certificate Authority (CA)

Which digital certificate displays the name of the entity behind the website?

Extended Validation (EV) Certificate

_____ performs a real-time lookup of a digital certificate's status.

Online Certificate Status Protocol (OCSP)

Which trust model has multiple CAs, one of which acts as a facilitator?

Bridge

What entity calls in crypto modules to perform cryptographic tasks?

Crypto service provider

_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.

Key escrow

A digital certificate associates _____.

the user's identity with his public key

Which of these is considered the strongest cryptographic transport protocol?

TLS v1.2

Digital certificates can be used for each of these EXCEPT _____.

to verify the authenticity of the Registration Authorizer

Which of the following is NOT a method for strengthening a key?

Variability

A centralized directory of digital certificates is called a(n) _____.

Certificate Repository (CR)

Public key infrastructure (PKI) _____.

is the management of digital certificates

_____ is a protocol for securely accessing a remote computer.

Secure Shell (SSH)

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

Cipher Block Chaining (CBC)

Which of these is NOT part of the certificate life cycle?

authorization

A(n) _____ is a published set of rules that govern the operation of a PKI.

certificate policy (CP)

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

salt

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.

digital certificate

Security+ Chapter 4 - Subjecto.com

Security+ Chapter 4

Your page rank:

Total word count: 310
Pages: 1

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

Session keys

Which statement is NOT true regarding hierarchical trust models?

It is designed for use on a large scale.

An entity that issues digital certificates is a _____.

Certificate Authority (CA)

Which digital certificate displays the name of the entity behind the website?

Extended Validation (EV) Certificate

_____ performs a real-time lookup of a digital certificate’s status.

Online Certificate Status Protocol (OCSP)

Which trust model has multiple CAs, one of which acts as a facilitator?

Bridge

What entity calls in crypto modules to perform cryptographic tasks?

Crypto service provider

_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.

Key escrow

A digital certificate associates _____.

the user’s identity with his public key

Which of these is considered the strongest cryptographic transport protocol?

TLS v1.2

Digital certificates can be used for each of these EXCEPT _____.

to verify the authenticity of the Registration Authorizer

Which of the following is NOT a method for strengthening a key?

Variability

A centralized directory of digital certificates is called a(n) _____.

Certificate Repository (CR)

Public key infrastructure (PKI) _____.

is the management of digital certificates

_____ is a protocol for securely accessing a remote computer.

Secure Shell (SSH)

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

Cipher Block Chaining (CBC)

Which of these is NOT part of the certificate life cycle?

authorization

A(n) _____ is a published set of rules that govern the operation of a PKI.

certificate policy (CP)

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

salt

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____.

digital certificate

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending