Week-3
1). What is the first step taken when
validating a certificate?
A). Compare the CA that digitally signed
the certificate to a list of CAs that have already been loaded into the
receiver’s computer.
2). What
is a certificate repository?
A). A centralized directory containing public keys and their
corresponding certificates accessible by a subset of individuals
3). Requiring two individuals
to recover a lost key together is called __________.
A). dual control
4). What
is the advantage of using a centralized infrastructure for key generation?
A). It
is easier to implement, back up, and recover keys.
5). If the root CA’s private
key were compromised, what would happen?
A). All entities within the hierarchical trust model would be
drastically affected.
6). How is an outsourced CA
different from a public CA?
A). It provides dedicated services, and possibly equipment,
to an individual company.
7). Which type of certificate
authority is maintained and controlled by the company that implemented it?
A). In-house
certification authority (CA)
8). Why should an
organization construct and implement a PKI?
A). To
establish a level of trust between two entities
9). It is important that
certificates and keys are properly destroyed when their __________.
A). set
lifetime expires
10). Which term refers to the
process of restoring lost keys to the users or the company?
A). Key recovery
11). In the United States,
which organization is responsible for regulating products that produce electromagnetic
interference?
A). Federal
Communications Commission
12). What
is an advantage of using a flame-activated fire detection system?
A). They
can frequently detect a fire sooner than the other types of fire detection
systems.
13). The best type of fire
extinguisher for putting out common, combustible fires is a class C.
A). False
14).
A
person’s weight is a biological factor that can be used for authentication.
A). False
15).
Besides
physically securing access to your computers, you can do very little to prevent
drive imaging.
A). True
16).
Which
fire extinguisher class is best for an electrical fire?
A). Class
C
17). Which
term describes an operating system distribution specifically designed to run
the entire machine from an optical disc without using the hard drive?
A). Live CD
18). What is a drawback to
water-based fire suppression systems?
A). Water-based
systems are destructive to electrical equipment.
19). A mantrap is used to
combat tailgating.
A). True
20).
Which
statement accurately summarizes the “security problem”?
A). Physical
access negates all other security measures.
Comments
Post a Comment