D334 - PKI Drill

0.0(0)
studied byStudied by 17 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

x.509

The standard that defines the format used with public-key digital certificates.

2
New cards

CSR

A Certificate Signing Request that an entity submits to the CA to formally request a digital certificate.

3
New cards
  • CRL

  • OCSP

Which mechanisms from the list below can be checked to verify the validity of a digital certificate? Select two.

4
New cards

CA signs the list with the CA's own private key

What action does a CA take prior to publishing a CRL to ensure the list can be validated as authentic by those checking it for certificate statuses?

5
New cards

PKCS #7

_____ is a public-key cryptography standard used to sign and/or encrypt messages for PKI.

6
New cards

an asymmetric key pair

An entity looking to obtain a digital certificate must first generate ____.

7
New cards

Initialization

Certificate creation occurs during which stage of certificate management?

8
New cards

the issuing CA

Certificate revocation lists are published by _____.

9
New cards

period of validity

The timeframe a digital certificate is considered to be valid and can be trusted is known as the _____.

10
New cards

DER

Which encoding scheme for X.509 certificates supports binary format?

11
New cards

Issued

Certificate validation occurs during which stage of certificate management?

12
New cards

key pair (one private key, one public key)

Public key cryptography involves the use of a ____ for encryption and decryption.

13
New cards

PKCS #10

If Shawn were to generate a CSR to submit to a CA, what PKCS standard would be used?

14
New cards

CA

A ____ is a trusted third party that creates and issues digital certificates.

15
New cards

a CSR; their public key

An entity seeking a digital certificate will provide the CA with ___ and ____ as part of the initial request.

16
New cards

PKCS #12

Which public-key cryptography standard is used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust?

17
New cards

Cancellation

Certificate revocation occurs during which stage of certificate management?

18
New cards

revoked

___ describes the condition where a certificate is moved to an invalid or untrusted state before its original expiration date that cannot be reversed.

19
New cards

CA

A ___ validates the unique identifying information and public key information submitted by a requester and creates a digital certificate which essentially binds the requester's identity and public key to the certificate.

20
New cards

PEM

Which encoding scheme for X.509 certificates supports Base64 and ASCII text formats?

21
New cards

CER

Which common X.509 certificate file type supports formats used by the PEM and DER encoding schemes?

22
New cards

Cancellation

Certificate expiration occurs during which stage of certificate management?

23
New cards

CA will sign the certificate with its own private key

What will a certificate authority (CA) do just before issuing a digital certificate to a requesting entity?

24
New cards

PKCS #5

_____ is a public-key cryptography standard used for password-based encryption.

25
New cards

Hold

___ describes the condition where a certificate is moved to an invalid or untrusted state prior to its original expiration date, that can be reversed following investigation resolution.