Deck 15: Cryptographic Key Management and Distribution

ملء الشاشة (f)
exit full mode
سؤال
A major weakness of the public announcement of public keys is
that anyone can forge a public announcement.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Manual delivery of a key is not reasonable for link encryption.
سؤال
For end-to-end encryption over a network, manual delivery is
awkward.
سؤال
the secure use of cryptographic key algorithms depends on the
protection of the cryptographic keys.
سؤال
__________ refers to the means of delivering a key to two parties who wish to exchange data, without allowing others to see the key.

A)Manual key delivery
B)Key distribution technique
C)Session key delivery
D)Confidentional key distribution
سؤال
For symmetric encryption to work the two parties to an exchange
must share the same key and that key must be protected from
access by others.
سؤال
the point of public-key encryption is that the public key is __________ .

A)public
B)private
C)confidential
D)restricted
سؤال
A common requirement in a variety of protocols is for the
encryption of a symmetric key so that it can be distributed to two parties for future communication.
سؤال
X.509 is an important standard because the certificate structure
and authentication protocols defined in X.509 are used in a
variety of contexts.
سؤال
__________ are often used to limit the time in which a key exchange can take place and/or the lifetime of an exchanged key.

A)Relay messages
B)Session breaks
C)timestamps
D)Keynotes
سؤال
A key translation center generates and distributes session keys.
سؤال
A certification authority is an authority trusted by one or more
users to create and assign public key certificates.
سؤال
A certificate consists of a public key, an identifier of the key owner,
and the whole block signed by a trusted third party.
سؤال
the term __________ refers to a key that is used only once or at most is very short-lived.

A)lower level key
B)digital key
C)cryptographic key
D)ephemeral key
سؤال
Because of the efficiency of public-key cryptosystems, they are
almost always used for the direct encryption of sizable blocks of dat
A.
سؤال
A greater degree of security can be achieved by maintaining a
publicly available dynamic directory of public keys.
سؤال
A __________ is a server or distributed set of servers that maintains a database of information about users.

A)crypt
B)directory
C)KDC
D)KtC
سؤال
Because certificates are forgeable they cannot be placed in a
directory without the need for the directory to make special
efforts to protect them.
سؤال
X.509 dictates the use of a specific digital signature algorithm and
a specific hash function.
سؤال
Each user must share a unique key with the key distribution center
for purposes of key distribution.
سؤال
With the __________ scheme, if an adversary succeeds in obtaining or computing the private key of the directory authority, the adversary could authoritatively pass out counterfeit public keys and subsequently impersonate any participant and eavesdrop on messages sent to any participant.

A)public key authority
B)publicly available directory
C)public key certificates
D)public announcement
سؤال
A _________ transfers symmetric keys for future communication between two entities, at least one of whom has the ability to generate or acquire symmetric keys by themselves.
سؤال
__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.

A)Authority key identifier
B)Key usage
C)Subject key identifier
D)Certificate policies
سؤال
__________ is an integer value unique within the issuing CA that is unambiguously associated with this certificate.

A)Signature identifier
B)Version
C)Serial number
D)Issuer unique identifier
سؤال
the principal objective for developing a __________ is to enable secure, convenient, and efficient acquisition of public keys.

A)KtC
B)CRL
C)PKI
D)KDC
سؤال
the __________ identifies the public key to be used to verify the signature on this certificate or CRL.

A)authority key identifier
B)policy constraints
C)issuer name
D)directory
سؤال
Several techniques have been proposed for the distribution of public keys.the proposals can be grouped into the following four general schemes: public announcement, publicly available directory, public-key certificates, and ____________.
سؤال
A __________ generates and distributes session keys.
سؤال
Several techniques have been proposed for the distribution of public keys.the four proposals mentioned and discussed in the textbook are: Public announcement, Publicly available directory, Public-key authority, and _______ .
سؤال
One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.

A)master key
B)KDC
C)public key
D)end-to-end
سؤال
__________ is the process of administering or managing cryptographic keys for a cryptographic system.
سؤال
A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.
سؤال
If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.
سؤال
the strength of any cryptographic system rests with the ___________ .

A)end encryption
B)key distribution technique
C)nonce
D)X.509 certificate
سؤال
the heart of the X.509 scheme is the __________ certificate associate with each user.
سؤال
the _________ can be an end user; a device such as a router or server; a process; or any item that can be identified in the subject name of a public key certificate.

A)repository
B)certification authority
C)end entity
D)registration authority
سؤال
X.509 is based on the use of public-key cryptography and __________ .
سؤال
If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.

A)end-to-end encryption
B)key management
C)key distribution
D)link encryption
سؤال
the principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.

A)KDC
B)IEtF
C)PKI
D)CRL
سؤال
If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and
B.A _________ center is responsible for distributing keys to pairs of users as needed.
سؤال
A _________ is any method for storing and retrieving PKI-related information, such as public key certificates and CRLs.
سؤال
A __________ consists of a public key, an identifier of the key owner, and the whole block signed by a trusted third party and can be used by participants to exchange keys without contacting a public key authority in a way that is as reliable as if the keys were obtained directly from a public key authority.
سؤال
A __________ is defined as a set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
سؤال
the __________ is an authority trusted by one or more users to create and assign public key certificates.
سؤال
the certificate extensions fall into three main categories: key and policy information, __________ , and certification path constraints.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Cryptographic Key Management and Distribution
1
A major weakness of the public announcement of public keys is
that anyone can forge a public announcement.
True
2
Manual delivery of a key is not reasonable for link encryption.
False
3
For end-to-end encryption over a network, manual delivery is
awkward.
True
4
the secure use of cryptographic key algorithms depends on the
protection of the cryptographic keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
__________ refers to the means of delivering a key to two parties who wish to exchange data, without allowing others to see the key.

A)Manual key delivery
B)Key distribution technique
C)Session key delivery
D)Confidentional key distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
For symmetric encryption to work the two parties to an exchange
must share the same key and that key must be protected from
access by others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
the point of public-key encryption is that the public key is __________ .

A)public
B)private
C)confidential
D)restricted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
A common requirement in a variety of protocols is for the
encryption of a symmetric key so that it can be distributed to two parties for future communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
X.509 is an important standard because the certificate structure
and authentication protocols defined in X.509 are used in a
variety of contexts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
__________ are often used to limit the time in which a key exchange can take place and/or the lifetime of an exchanged key.

A)Relay messages
B)Session breaks
C)timestamps
D)Keynotes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
A key translation center generates and distributes session keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
A certification authority is an authority trusted by one or more
users to create and assign public key certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
A certificate consists of a public key, an identifier of the key owner,
and the whole block signed by a trusted third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
the term __________ refers to a key that is used only once or at most is very short-lived.

A)lower level key
B)digital key
C)cryptographic key
D)ephemeral key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Because of the efficiency of public-key cryptosystems, they are
almost always used for the direct encryption of sizable blocks of dat
A.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
A greater degree of security can be achieved by maintaining a
publicly available dynamic directory of public keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
A __________ is a server or distributed set of servers that maintains a database of information about users.

A)crypt
B)directory
C)KDC
D)KtC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Because certificates are forgeable they cannot be placed in a
directory without the need for the directory to make special
efforts to protect them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
X.509 dictates the use of a specific digital signature algorithm and
a specific hash function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Each user must share a unique key with the key distribution center
for purposes of key distribution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
With the __________ scheme, if an adversary succeeds in obtaining or computing the private key of the directory authority, the adversary could authoritatively pass out counterfeit public keys and subsequently impersonate any participant and eavesdrop on messages sent to any participant.

A)public key authority
B)publicly available directory
C)public key certificates
D)public announcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
A _________ transfers symmetric keys for future communication between two entities, at least one of whom has the ability to generate or acquire symmetric keys by themselves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.

A)Authority key identifier
B)Key usage
C)Subject key identifier
D)Certificate policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
__________ is an integer value unique within the issuing CA that is unambiguously associated with this certificate.

A)Signature identifier
B)Version
C)Serial number
D)Issuer unique identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
the principal objective for developing a __________ is to enable secure, convenient, and efficient acquisition of public keys.

A)KtC
B)CRL
C)PKI
D)KDC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
the __________ identifies the public key to be used to verify the signature on this certificate or CRL.

A)authority key identifier
B)policy constraints
C)issuer name
D)directory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
Several techniques have been proposed for the distribution of public keys.the proposals can be grouped into the following four general schemes: public announcement, publicly available directory, public-key certificates, and ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A __________ generates and distributes session keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
Several techniques have been proposed for the distribution of public keys.the four proposals mentioned and discussed in the textbook are: Public announcement, Publicly available directory, Public-key authority, and _______ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.

A)master key
B)KDC
C)public key
D)end-to-end
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
__________ is the process of administering or managing cryptographic keys for a cryptographic system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
the strength of any cryptographic system rests with the ___________ .

A)end encryption
B)key distribution technique
C)nonce
D)X.509 certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
the heart of the X.509 scheme is the __________ certificate associate with each user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
the _________ can be an end user; a device such as a router or server; a process; or any item that can be identified in the subject name of a public key certificate.

A)repository
B)certification authority
C)end entity
D)registration authority
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
X.509 is based on the use of public-key cryptography and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.

A)end-to-end encryption
B)key management
C)key distribution
D)link encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
the principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.

A)KDC
B)IEtF
C)PKI
D)CRL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and
B.A _________ center is responsible for distributing keys to pairs of users as needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
A _________ is any method for storing and retrieving PKI-related information, such as public key certificates and CRLs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
A __________ consists of a public key, an identifier of the key owner, and the whole block signed by a trusted third party and can be used by participants to exchange keys without contacting a public key authority in a way that is as reliable as if the keys were obtained directly from a public key authority.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
A __________ is defined as a set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
the __________ is an authority trusted by one or more users to create and assign public key certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
the certificate extensions fall into three main categories: key and policy information, __________ , and certification path constraints.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.