CRL 3.5.10 QUESTIONS AND
ANSWERS WITH COMPLETE
SOLUTIONS 100% CORRECT!!!
Q: Once an SSL client confirms that a server’s certificate was issued by a
trusted Certificate Authority (CA), what is the next step in verifying the
server’s identity?
A: The client uses the CA’s public key to verify the CA’s digital signature on
the server’s certificate.
Q: In which situation would a digital certificate need to be added to a
Certificate Revocation List (CRL)?
A: If the certificate’s private key has been compromised.
Q: What technology was specifically created to streamline and improve the
process of checking whether digital certificates are still valid in large or
complex networks?
A: Online Certificate Status Protocol (OCSP)
A PKI is an implementation for managing which type of encryption?
answer
Symmetric
Hashing
Asymmetric
Steganography - ANSWERS✔✔Asymmetric
In the process of obtaining a digital certificate, which entity may a certificate
authority rely on to perform the validation of the certificate signing request
(CSR)?
answer
Certificate revocation list
Root authority
Registration authority
Online Certificate Status Protocol - ANSWERS✔✔Registration authority
A medium-sized e-commerce company is planning to upgrade their website's
security by acquiring a certificate from a certificate authority (CA).
ANSWERS WITH COMPLETE
SOLUTIONS 100% CORRECT!!!
Q: Once an SSL client confirms that a server’s certificate was issued by a
trusted Certificate Authority (CA), what is the next step in verifying the
server’s identity?
A: The client uses the CA’s public key to verify the CA’s digital signature on
the server’s certificate.
Q: In which situation would a digital certificate need to be added to a
Certificate Revocation List (CRL)?
A: If the certificate’s private key has been compromised.
Q: What technology was specifically created to streamline and improve the
process of checking whether digital certificates are still valid in large or
complex networks?
A: Online Certificate Status Protocol (OCSP)
A PKI is an implementation for managing which type of encryption?
answer
Symmetric
Hashing
Asymmetric
Steganography - ANSWERS✔✔Asymmetric
In the process of obtaining a digital certificate, which entity may a certificate
authority rely on to perform the validation of the certificate signing request
(CSR)?
answer
Certificate revocation list
Root authority
Registration authority
Online Certificate Status Protocol - ANSWERS✔✔Registration authority
A medium-sized e-commerce company is planning to upgrade their website's
security by acquiring a certificate from a certificate authority (CA).