Answers With All Chapters Graded A+ Full completed
Document 2024-2025.
Determining the path between X.509 digital certificates and a trusted root - CORRECT
ANSWERS -Delegated Path Discovery
The validation of the path to the trusted root according to a particular validation policy -
CORRECT ANSWERS -Delegated Path Validation
Setup and initialization
Administration
Cancelation
are the phases of? - CORRECT ANSWERS -Key life-cycle
Registration
Key pair Generation
Certificate Generation
Certificate Dissemination - CORRECT ANSWERS -Setup and Initialization Phase
Key storage
Certificate retrieval and validation
Backup or escrow
Recovery - CORRECT ANSWERS -Administration Phase
Expiration
Renewal
Revocation
Suspension
Destruction - CORRECT ANSWERS -Cancelation and History Phase
Person who can recover keys from keystore on behalf of a user
Highly-trusted person
Issue recovery agent certificates
- EFS Recovery Agent certificate
- Key Recovery Agent Certificate - CORRECT ANSWERS -Update and Path
Vulnerabilities
The most basic form of authentication
User name and password are transmitted over the network and compared to a table of
corresponding name-password pairs.
Name-password pair table is encrypted, but the transmission of the passwords is done
in clear text, unencrypted.
It is the basic authentication feature for HTTP - CORRECT ANSWERS -PAP (Password
Authentication Protocol)
, This is a proprietary version of PAP, it is somewhat more secure then PAP because
username and passwords are both encrypted when they are sent over the network. -
CORRECT ANSWERS -S-PAP (Shiva Password Authentication Protocol)
After a connecting is established the authenticator will "challenge" the requestor.
The requestor responds with a calculated has function.
The authenticator checks the response against its own calculation of the expected hash
function. If they match the authenticator acknowledges the request, otherwise the
connection is terminated.
This processes is repeated at random intervals. - CORRECT ANSWERS -CHAP
(Challenge-Handshake Authentication Protocol)
These are usually the encryption of a message digest with the senders private key.
In order to verify them, the recipient uses the senders public key.
They are considered good if they provide the following.
Authentication
Integrity
Non-repudiation - CORRECT ANSWERS -Digital Signature
It is a digital document that contains a public key and some information to allow your
system to verify where they key came from.
This is the most common way to distribute pubic keys in asymmetric cryptography. -
CORRECT ANSWERS -Digital Certificate
uses asymmetric key pairs and combines software, encryption and services to provide a
means of protecting the security of business communications and transactions. -
CORRECT ANSWERS -PKI (Public Key Infrastructure)
They are in place by the RSA to ensure uniform certificate management throughout the
internet - CORRECT ANSWERS -PKCS (Public Key Cryptography Standards)
A certificate is a digital representation of information that identifies you as a relevant
entity by a? - CORRECT ANSWERS -Trusted Third Party (TTP)
This is an entity trusted by one or more users to manage certificates - CORRECT
ANSWERS -CA (Certificate Authority)
Used to take the burden off of a CA by handling verification prior to certificates being
issues. They act as a proxy between user and CA. They receive requests, authenticate
them and forward them to the CA - CORRECT ANSWERS -RA (Registration Authority)
is a set of rules that defines how a certificate may be used. - CORRECT ANSWERS -
CP (Certificate Policy)