Week-3
1). What is the first step taken when validating a certificate?
Compare the CA that digitally signed the certificate to a list of CAs that have already been loaded into the receiver’s computer.
2). What is a certificate repository?
A centralized directory containing public keys and their corresponding certificates accessible by a subset of individuals
3). Requiring two individuals to recover a lost key together is called __________.
dual control
4). What is the advantage of using a centralized infrastructure for key generation?
It is easier to implement, back up, and recover keys.
5). If the root CA’s private key were compromised, what would happen?
All entities within the hierarchical trust model would be drastically affected.
6). How is an outsourced CA different from a public CA?
It provides dedicated services, and possibly equipment, to an individual company.
7). Which type of certificate authority is maintained and controlled by the company that implemented it?
In-house certification authority (CA)
8). Why should an organization construct and implement a PKI?
To establish a level of trust between two entities
9). It is important that certificates and keys are properly destroyed when their __________.
set lifetime expires
10). Which term refers to the process of restoring lost keys to the users or the company?
Key recovery
11). In the United States, which organization is responsible for regulating products that produce electromagnetic interference?
Federal Communications Commission
12). What is an advantage of using a flame-activated fire detection system?
They can frequently detect a fire sooner than the other types of fire detection systems.
13). The best type of fire extinguisher for putting out common, combustible fires is a class C.
False
14). A person’s weight is a biological factor that can be used for authentication.
False
15). Besides physically securing access to your computers, you can do very little to prevent drive imaging.
True
16). Which fire extinguisher class is best for an electrical fire?
Class C
17). Which term describes an operating system distribution specifically designed to run the entire machine from an optical disc without using the hard drive?
Live CD
18). What is a drawback to water-based fire suppression systems?
Water-based systems are destructive to electrical equipment.
19). A mantrap is used to combat tailgating.
True
20). Which statement accurately summarizes the “security problem”?
Physical access negates all other security measures.
Other Links:
See other websites for quiz:
Check on QUIZLET