Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Public Key Infra...

comptia+ topic

QuestionAnswer
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates? pki
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as: ca
What is the PKI role of Registration Authority (RA)? (Select 2 answers) Accepting requests for digital certificates Authenticating the entity making the request
Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers) crl ocsp
What is the fastest way for checking the validity of a digital certificate? ocsp
Which of the answers listed below refers to a method for requesting a digital certificate? csr
In digital certificate, the Common Name field describes a device or any other entity the certificate has been issued for. In SSL certificate, CN refers to Fully Qualified Domain Name which is domain name of the server protected by the SSL certificate. true
Which digital certificate type allows multiple subdomains to be protected by a single certificate? wildcard certificate
A digital certificate which allows multiple domains to be protected by a single certificate is known as: Subject Alternative Name (SAN) certificate
Code-signing certificates are used to verify the authenticity and integrity of software. Self-signed certificates have a lower level of trustworthiness, because they are not signed by a Certificate Authority (CA). Computer certificates (a.k.a. machine... true
What are the characteristic features of the Distinguished Encoding Rules (DER) digital certificate format? (Select 3 answers) Encoded in binary format .der and .cer file extensions Generally used for Java servers
Which of the following answers refer to the Privacy Enhanced Email (PEM) digital certificate format? (Select 3 answers) Encoded in text (ASCII Base64) format .pem, .crt, .cer and .key file extensions Generally used for Apache servers or similar configurations
What are the characteristic features of the Personal Information Exchange (PFX) and P12 digital certificate format? (Select 3 answers) .pfx and .p12 file extensions Generally used for Microsoft windows servers encoded in binary format
Which of the following answers refer to the P7B digital certificate format? (Select 3 answers) Encoded in text (ASCII Base64) format .p7b file extension Generally used for Microsoft windows and Java Tomcat servers
Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)? stapling
Which of the following answers refers to a deprecated security mechanism designed to defend HTTPS websites against impersonation attacks performed with the use of fraudulent digital certificates? pinning
Which of the answers listed below refer to examples of PKI trust models? Single CA model Hierarchical model (root CA + intermediate CAs) Mesh model (cross-certifying CAs) Web of trust model (all CAs act as root CAs) Client-server mutual authentication model
A trusted third-party storage solution providing backup source for cryptographic keys is referred to as: key escrow
Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. Recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow. true
The term "Certificate chaining" refers to the process of verifying authenticity of a newly received digital certificate. Such process involves checking all the certificates in the chain of certificates from a trusted root CA, through any intermediate... true
Created by: laylanichole
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards