Deck 6: Designing and Implementing a PKI

ملء الشاشة (f)
exit full mode
سؤال
The ____ is used to request certificates on behalf of a user and provides a signature.

A) enrollment agent
C) enrollment standard
B) certificate intermediary
D) enrollment GUI
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ is the first CA in the hierarchy.

A) basis CA
C) root CA
B) original CA
D) subordinate CA
سؤال
Using ____, you can execute command-line commands from one server against a remote server.

A) WinRS
C) WinRM
B) WinSAT
D) WCEUtil
سؤال
When a ____ key pair is used, one key encrypts the data and the other key decrypts the data.

A) public/private
C) symmetric
B) private/private
D) bilateral
سؤال
A CA can be a company such as VeriSign that issues certificates for use on the Internet, or it can be a software component, such as Microsoft's Certification Authority, that issues certificates.
سؤال
Once the CA is created, it can be used to issue certificates.
سؤال
The same public key can decrypt information encrypted with the public key.
سؤال
The first time a user encrypts data using EFS, a ____ key pair is generated.

A) private
C) symmetric
B) public/private
D) bifurcated
سؤال
When a public and private key are used for encryption, the process is called ____.

A) symmetric encryption
C) bilateral encryption
B) asymmetric encryption
D) dual encryption
سؤال
____ involves the creation, issuing, managing, and revoking of certificates.

A) Certificate threat management
C) Public key management
B) Certificate life cycle management
D) Certificate Practice Policy
سؤال
____ allows an administrator to configure certificates to be issued to clients without them having to request the certificates.

A) Autoprovisioning
B) Autoenrollment
C) Autocertification
D) Autoconfiguration
سؤال
An established public CA will have a root certificate in the ____.

A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
سؤال
A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.

A) smart card
C) trusted computing base
B) token
D) trusted computing module
سؤال
Revoked certificates are published by the CA via a(n) ____ using an X.509 version 2 certificate.

A) invalid certificates list (ICL)
C) certificate practice statement (CPS)
B) certificate revocation list (CRL)
D) certificate life cycle list (CLCL)
سؤال
The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.

A) Public-key snap-in
C) Encryption snap-in
B) Computer Management snap-in
D) Certificates snap-in
سؤال
A ____ is used to issue and manage certificates.

A) public key registry
C) public key store
B) public key cryptography
D) public key infrastructure
سؤال
A PKI may appear complex on the surface but is actually rather simple.
سؤال
After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
سؤال
A(n) ____ is a complete listing of all certificates revoked by the CA.

A) new CRL
C) alpha CRL
B) delta CRL
D) revocation CRL
سؤال
A ____ is a number created by performing a hashing algorithm on data.

A) signature
C) cipher
B) key
D) hash
سؤال
Explain how you can view certificates in the Trusted Root Certification Authority.
سؤال
A(n) ___________________ lists only the changes since the last CRL publication.
سؤال
Explain automatic certificate enrollment.
سؤال
The Network Device Enrollment service uses a(n) ____ to accept the registration requests.

A) certification authority
C) enrollment authority
B) registration authority
D) requirements authority
سؤال
A(n) ___________________ provides authentication, integrity, and non-repudiation.
سؤال
____ add advanced cryptographic settings to the certificate, and can be used with Windows Vista and later clients.

A) V1 templates
C) V3 templates
B) V2 templates
D) V4 templates
سؤال
AD CS publishes the full CRL once a ____ by default.

A) day
C) month
B) week
D) year
سؤال
List two purposes for which certificates are used.
سؤال
Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
سؤال
List the four steps required to complete the configuration of the online responder.
سؤال
Users in the ___________________ role are granted Backup File and Directories and Restore File and Directories permissions.
سؤال
One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.
سؤال
Users in the ____ role are granted the Manage Auditing and Security Log permissions.

A) Administrator
C) Auditor
B) Approver
D) Validator
سؤال
Explain how to deploy trusted root certificates via group policy.
سؤال
AD CS publishes a delta CRL once a ____ by default.

A) day
C) month
B) week
D) year
سؤال
Explain how the online responder service is configured.
سؤال
You can use the ____ to view and manage all of the certificate stores used by the computer, users, or services on a computer.

A) Policies MMC
C) System MMC
B) Computer Management MMC
D) Certificates MMC
سؤال
List and describe two permissions that can be granted to enterprise admins.
سؤال
List and describe two AD CS role services.
سؤال
Discuss how certificates issued to network devices can be used.
سؤال
Describe restricted enrollment agents.
سؤال
Match between columns
The entity that issues the certificates
public key infrastructure
The entity that issues the certificates
CA
The entity that issues the certificates
asymmetric encryption
The entity that issues the certificates
symmetric encryption
The entity that issues the certificates
Online responder
The entity that issues the certificates
Enterprise PKI
The entity that issues the certificates
EFS
The entity that issues the certificates
Network Device Enrollment service
The entity that issues the certificates
SCEP
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
public key infrastructure
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
CA
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
asymmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
symmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Online responder
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Enterprise PKI
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
EFS
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Network Device Enrollment service
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
SCEP
If an enterprise has more than one CA, this MMC can be used to manage all of them
public key infrastructure
If an enterprise has more than one CA, this MMC can be used to manage all of them
CA
If an enterprise has more than one CA, this MMC can be used to manage all of them
asymmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
symmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
Online responder
If an enterprise has more than one CA, this MMC can be used to manage all of them
Enterprise PKI
If an enterprise has more than one CA, this MMC can be used to manage all of them
EFS
If an enterprise has more than one CA, this MMC can be used to manage all of them
Network Device Enrollment service
If an enterprise has more than one CA, this MMC can be used to manage all of them
SCEP
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
public key infrastructure
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
CA
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
asymmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
symmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Online responder
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Enterprise PKI
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
EFS
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Network Device Enrollment service
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
SCEP
Very secure, but also resource intensive, requiring a lot of processing power
public key infrastructure
Very secure, but also resource intensive, requiring a lot of processing power
CA
Very secure, but also resource intensive, requiring a lot of processing power
asymmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
symmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
Online responder
Very secure, but also resource intensive, requiring a lot of processing power
Enterprise PKI
Very secure, but also resource intensive, requiring a lot of processing power
EFS
Very secure, but also resource intensive, requiring a lot of processing power
Network Device Enrollment service
Very secure, but also resource intensive, requiring a lot of processing power
SCEP
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
public key infrastructure
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
CA
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
asymmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
symmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Online responder
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Enterprise PKI
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
EFS
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Network Device Enrollment service
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
SCEP
Can be used by individual users to encrypt their data
public key infrastructure
Can be used by individual users to encrypt their data
CA
Can be used by individual users to encrypt their data
asymmetric encryption
Can be used by individual users to encrypt their data
symmetric encryption
Can be used by individual users to encrypt their data
Online responder
Can be used by individual users to encrypt their data
Enterprise PKI
Can be used by individual users to encrypt their data
EFS
Can be used by individual users to encrypt their data
Network Device Enrollment service
Can be used by individual users to encrypt their data
SCEP
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
public key infrastructure
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
CA
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
asymmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
symmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Online responder
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Enterprise PKI
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
EFS
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Network Device Enrollment service
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
SCEP
Specifically designed to support automatic request and retrieval of certificates for network devices
public key infrastructure
Specifically designed to support automatic request and retrieval of certificates for network devices
CA
Specifically designed to support automatic request and retrieval of certificates for network devices
asymmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
symmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
Online responder
Specifically designed to support automatic request and retrieval of certificates for network devices
Enterprise PKI
Specifically designed to support automatic request and retrieval of certificates for network devices
EFS
Specifically designed to support automatic request and retrieval of certificates for network devices
Network Device Enrollment service
Specifically designed to support automatic request and retrieval of certificates for network devices
SCEP
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Designing and Implementing a PKI
1
The ____ is used to request certificates on behalf of a user and provides a signature.

A) enrollment agent
C) enrollment standard
B) certificate intermediary
D) enrollment GUI
A
2
The ____ is the first CA in the hierarchy.

A) basis CA
C) root CA
B) original CA
D) subordinate CA
C
3
Using ____, you can execute command-line commands from one server against a remote server.

A) WinRS
C) WinRM
B) WinSAT
D) WCEUtil
C
4
When a ____ key pair is used, one key encrypts the data and the other key decrypts the data.

A) public/private
C) symmetric
B) private/private
D) bilateral
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A CA can be a company such as VeriSign that issues certificates for use on the Internet, or it can be a software component, such as Microsoft's Certification Authority, that issues certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Once the CA is created, it can be used to issue certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The same public key can decrypt information encrypted with the public key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
The first time a user encrypts data using EFS, a ____ key pair is generated.

A) private
C) symmetric
B) public/private
D) bifurcated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
When a public and private key are used for encryption, the process is called ____.

A) symmetric encryption
C) bilateral encryption
B) asymmetric encryption
D) dual encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ involves the creation, issuing, managing, and revoking of certificates.

A) Certificate threat management
C) Public key management
B) Certificate life cycle management
D) Certificate Practice Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ allows an administrator to configure certificates to be issued to clients without them having to request the certificates.

A) Autoprovisioning
B) Autoenrollment
C) Autocertification
D) Autoconfiguration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
An established public CA will have a root certificate in the ____.

A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.

A) smart card
C) trusted computing base
B) token
D) trusted computing module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
Revoked certificates are published by the CA via a(n) ____ using an X.509 version 2 certificate.

A) invalid certificates list (ICL)
C) certificate practice statement (CPS)
B) certificate revocation list (CRL)
D) certificate life cycle list (CLCL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.

A) Public-key snap-in
C) Encryption snap-in
B) Computer Management snap-in
D) Certificates snap-in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ____ is used to issue and manage certificates.

A) public key registry
C) public key store
B) public key cryptography
D) public key infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
A PKI may appear complex on the surface but is actually rather simple.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n) ____ is a complete listing of all certificates revoked by the CA.

A) new CRL
C) alpha CRL
B) delta CRL
D) revocation CRL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ____ is a number created by performing a hashing algorithm on data.

A) signature
C) cipher
B) key
D) hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Explain how you can view certificates in the Trusted Root Certification Authority.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) ___________________ lists only the changes since the last CRL publication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Explain automatic certificate enrollment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Network Device Enrollment service uses a(n) ____ to accept the registration requests.

A) certification authority
C) enrollment authority
B) registration authority
D) requirements authority
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ___________________ provides authentication, integrity, and non-repudiation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
____ add advanced cryptographic settings to the certificate, and can be used with Windows Vista and later clients.

A) V1 templates
C) V3 templates
B) V2 templates
D) V4 templates
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
AD CS publishes the full CRL once a ____ by default.

A) day
C) month
B) week
D) year
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
List two purposes for which certificates are used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
List the four steps required to complete the configuration of the online responder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Users in the ___________________ role are granted Backup File and Directories and Restore File and Directories permissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Users in the ____ role are granted the Manage Auditing and Security Log permissions.

A) Administrator
C) Auditor
B) Approver
D) Validator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Explain how to deploy trusted root certificates via group policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
AD CS publishes a delta CRL once a ____ by default.

A) day
C) month
B) week
D) year
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Explain how the online responder service is configured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
You can use the ____ to view and manage all of the certificate stores used by the computer, users, or services on a computer.

A) Policies MMC
C) System MMC
B) Computer Management MMC
D) Certificates MMC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
List and describe two permissions that can be granted to enterprise admins.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
List and describe two AD CS role services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Discuss how certificates issued to network devices can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe restricted enrollment agents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
The entity that issues the certificates
public key infrastructure
The entity that issues the certificates
CA
The entity that issues the certificates
asymmetric encryption
The entity that issues the certificates
symmetric encryption
The entity that issues the certificates
Online responder
The entity that issues the certificates
Enterprise PKI
The entity that issues the certificates
EFS
The entity that issues the certificates
Network Device Enrollment service
The entity that issues the certificates
SCEP
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
public key infrastructure
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
CA
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
asymmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
symmetric encryption
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Online responder
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Enterprise PKI
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
EFS
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
Network Device Enrollment service
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
SCEP
If an enterprise has more than one CA, this MMC can be used to manage all of them
public key infrastructure
If an enterprise has more than one CA, this MMC can be used to manage all of them
CA
If an enterprise has more than one CA, this MMC can be used to manage all of them
asymmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
symmetric encryption
If an enterprise has more than one CA, this MMC can be used to manage all of them
Online responder
If an enterprise has more than one CA, this MMC can be used to manage all of them
Enterprise PKI
If an enterprise has more than one CA, this MMC can be used to manage all of them
EFS
If an enterprise has more than one CA, this MMC can be used to manage all of them
Network Device Enrollment service
If an enterprise has more than one CA, this MMC can be used to manage all of them
SCEP
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
public key infrastructure
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
CA
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
asymmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
symmetric encryption
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Online responder
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Enterprise PKI
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
EFS
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Network Device Enrollment service
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
SCEP
Very secure, but also resource intensive, requiring a lot of processing power
public key infrastructure
Very secure, but also resource intensive, requiring a lot of processing power
CA
Very secure, but also resource intensive, requiring a lot of processing power
asymmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
symmetric encryption
Very secure, but also resource intensive, requiring a lot of processing power
Online responder
Very secure, but also resource intensive, requiring a lot of processing power
Enterprise PKI
Very secure, but also resource intensive, requiring a lot of processing power
EFS
Very secure, but also resource intensive, requiring a lot of processing power
Network Device Enrollment service
Very secure, but also resource intensive, requiring a lot of processing power
SCEP
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
public key infrastructure
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
CA
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
asymmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
symmetric encryption
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Online responder
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Enterprise PKI
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
EFS
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Network Device Enrollment service
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
SCEP
Can be used by individual users to encrypt their data
public key infrastructure
Can be used by individual users to encrypt their data
CA
Can be used by individual users to encrypt their data
asymmetric encryption
Can be used by individual users to encrypt their data
symmetric encryption
Can be used by individual users to encrypt their data
Online responder
Can be used by individual users to encrypt their data
Enterprise PKI
Can be used by individual users to encrypt their data
EFS
Can be used by individual users to encrypt their data
Network Device Enrollment service
Can be used by individual users to encrypt their data
SCEP
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
public key infrastructure
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
CA
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
asymmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
symmetric encryption
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Online responder
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Enterprise PKI
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
EFS
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Network Device Enrollment service
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
SCEP
Specifically designed to support automatic request and retrieval of certificates for network devices
public key infrastructure
Specifically designed to support automatic request and retrieval of certificates for network devices
CA
Specifically designed to support automatic request and retrieval of certificates for network devices
asymmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
symmetric encryption
Specifically designed to support automatic request and retrieval of certificates for network devices
Online responder
Specifically designed to support automatic request and retrieval of certificates for network devices
Enterprise PKI
Specifically designed to support automatic request and retrieval of certificates for network devices
EFS
Specifically designed to support automatic request and retrieval of certificates for network devices
Network Device Enrollment service
Specifically designed to support automatic request and retrieval of certificates for network devices
SCEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.