______ is the standard that defines the format used with public-key digital certificates.
x.509
x.400
X.409
x.500
An entity looking to obtain a digital certificate will create and submit a _____ to the CA to formally request the certificate.
CSR
PEM
PKCS
registration authority
Which mechanisms from the list below can be checked to verify the validity of a digital certificate? Select two.
CRL And OCSP
OCSP AND PEM
CSR AND CA
OSCP AND CRL
What action does a CA take prior to publishing a CRL to ensure the list can be validated as authentic by those checking it for certificate statuses?
CA signs the list with the CA's own private key
CA duplicates the list
CA signs the list with the CA's own public key
_____ is a public-key cryptography standard used to sign and/or encrypt messages for PKI.
PKCS #7
PKCS #9
PKCS #12
PKCS #5
An entity looking to obtain a digital certificate must first generate ____.
an asymmetric key pair
a symmetric key
a registration authority
a certificate authority
Certificate creation occurs during which stage of certificate management?
Initialization
Issued
Cancellation
Hold
Certificate revocation lists are published by _____.
the issuing CA
the certificate holder
any certificate authority
NIST
The timeframe a digital certificate is considered to be valid and can be trusted is known as the _____.
period of validity
CRL
CSR
cancellation stage
Which encoding scheme for X.509 certificates supports binary format?
DER
PEM
IKE
CSR
Certificate validation occurs during which stage of certificate management?
Issued
Initialization
Cancellation
Hold
Public key cryptography involves the use of a ____ for encryption and decryption.
key pair (one private key, one public key)
key pair (one private key, one secret key)
single private key
If Shawn were to generate a CSR to submit to a CA, what PKCS standard would be used?
PKCS #10
PKCS #5
PKCS #7
PKCS #12
A ____ is a trusted third party that creates and issues digital certificates.
CA
RA
CSR
DER
An entity seeking a digital certificate will provide the CA with ___ and ____ as part of the initial request.
a CSR; their public key
a CSR; their private key
their public key; their private key
Which public-key cryptography standard is used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust?
PKCS #12
PKCS #9
PKCS #5
PKCS #7
Certificate revocation occurs during which stage of certificate management?
Cancellation
Initialization
Issued
Hold
___ describes the condition where a certificate is moved to an invalid or untrusted state before its original expiration date that cannot be reversed.
revoked
Hold
Retrieval
Intermediate
A ___ validates the unique identifying information and public key information submitted by a requester and creates a digital certificate which essentially binds the requester's identity and public key to the certificate.
CA
CSR
RA
CRL
Which encoding scheme for X.509 certificates supports Base64 and ASCII text formats?
PEM
DER
CSR
IKE
Which common X.509 certificate file type supports formats used by the PEM and DER encoding schemes?
.CER
.mpg
.crt
.csr
Certificate expiration occurs during which stage of certificate management?
Cancellation
Initialization
Issued
Hold
What will a certificate authority (CA) do just before issuing a digital certificate to a requesting entity?
CA will sign the certificate with its own private key
CA will sign the certificate with the requester’s public key
CA will sign the certificate with its own public key
CA will pad the certificate
_____ is a public-key cryptography standard used for password-based encryption.
PKCS #5
PKCS #9
PKCS #12
PKCS #7
___ describes the condition where a certificate is moved to an invalid or untrusted state prior to its original expiration date, that can be reversed following investigation resolution.
Hold
revoked
Retrieval
Intermediate