Deck 3: Essential Public Key Infrastructure

ملء الشاشة (f)
exit full mode
سؤال
12)If a CA creates a certificate that is signed by its own private key, it is commonly known as a(n) ____.

A) intermediate CA
B) self-signed CA
C) mid-level CA
D) domain CA
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
1)The foundation of PKI was established approximately 30 years ago with the invention of private key cryptography.
سؤال
7)The core services provided by PKI are ____ , integrity and confidentiality.

A) authentication
B) authorization
C) availability
D) nonrepudiation
سؤال
2)The most common method of entity authentication is a prompting for a user ID and password.
سؤال
13)A CA certificate signed by another CA's private key is referred as a(n) ____ .

A) self-signed CA
B) root CA
C) intermediate CA
D) top-level CA
سؤال
20)The ____ phase ensures that the private key and public key certificates created are used correctly and efficiently in the PKI community.

A) registration
B) issued
C) initialization
D) cancellation
سؤال
6)Digital signature provides not only data origin authentication but also data ____.

A) availability
B) entity confidentiality
C) integrity
D) confidentiality
سؤال
3)The fundamental premise of public key cryptography is to provide secure communication between strangers.
سؤال
11)____ is the certification of a document as authentic and true by a public official known as a "notary public."

A) Trusted source
B) Nonrepudiation
C) Authentication
D) Notarization
سؤال
15)A(n) ____ creates key pairs and also implements backup and recovery of private keys.

A) CRL server
B) certificate bank
C) key management server
D) OCSP server
سؤال
14)Any method of publishing a certificate without a network-access protocol can be classified as ____ sharing.

A) in-line
B) real-time
C) mail-based
D) out-of-band
سؤال
9)The technical term "____" refers to communications that occur outside of previously established communications method or channel.

A) real-time
B) in-line
C) in-band
D) out-of-band
سؤال
5)Key and certificate life cycle management must be in place to enable public key cryptography to be used correctly.
سؤال
16)An X.509 v3 certificate ____ extension is a bit string used to indicate the usage supported by the public key of this certificate.

A) certificate policies
B) key usage
C) private key usage period
D) policy mappings
سؤال
10)____ is a service that provides the assurance that an entity remains honest about its actions.

A) Nonrepudiation
B) Availability
C) Integrity
D) Confidence
سؤال
8)____ authentication means that only a single assurance method is used for authentication.

A) Simple
B) Single-factor
C) Entity
D) Data origin
سؤال
18)The ____ is intended for displaying information to a replying party when a certificate is used.

A) URI qualifier
B) CPS pointer
C) user notice qualifier
D) OID statement
سؤال
4)The initial creation of the public and private key pair is usually performed in the certificate authority's system.
سؤال
17)____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.

A) Name constraints
B) Policy mappings
C) Policy constraints
D) Basic constraints
سؤال
19)____ is the process in which the identity of an end entity is established and verified.

A) Registration
B) Keying material generation
C) Certificate creation
D) Certificate distribution
سؤال
39)Briefly describe the main characteristics of an authority revocation list.
سؤال
34)What are the four assurance methods? Give examples of each.
سؤال
23)____ is a publishing method in which revocation information is updated and posted for entities in the PKI community to obtain.

A) OCSP
B) CPS
C) PKCS
D) CRL
سؤال
27)____________________ is the assurance that an entity is who it claims to be.
سؤال
35)Alice is sending a message to Bob. How can Alice ensure data integrity?
سؤال
36)What are some of the common tasks of a registration authority?
سؤال
What are the most common approaches to provide PKI client functionalities?
سؤال
38)Briefly explain the certificate expiration task of the key and certificate life cycle management cancellation phase.
سؤال
26)The PKIX Working Group was established in the fall of 1995 under the standard organization ____.

A) ACM
B) ISO
C) IEEE
D) IETF
سؤال
21)The key and certificate life cycle management concludes with the ____ phase.

A) issued
B) registration
C) certification
D) cancellation
سؤال
41)What are the three most common methods for implementing Delta CRL?
سؤال
25)A(n) ____ creates an immediate layer of abstraction for storing revocation information in a more flexible way.

A) partitioned CRL
B) complete CRL
C) redirect CRL
D) indirect CRL
سؤال
22)____ is the most common method of certificate revocation.

A) CRL
B) OCSP
C) ODI
D) CPS
سؤال
29)The _________________________ is the centerpiece and the most critical component of a PKI.
سؤال
28)____________________ is the assurance of data privacy and is usually provided by symmetric cryptography using algorithms such as AES and 3DES.
سؤال
40)What are the steps required to use a CRL DP?
سؤال
31)____________________ occurs between the time of learning that the certificate should be revoked and the time that the revocation information is actually posted for the relying parties.
سؤال
24)CRL distribution point (CRL DP) is also called ____.

A) complete CRL
B) partitioned CRL
C) ARL CRL
D) indirect CRL
سؤال
30)A(n) ____________________ provides a common trusted source for anyone in the PKI community to retrieve certificates.
سؤال
33)What are the general requirements a security infrastructure must satisfy?
سؤال
Match between columns
a list of certificates that have been revoked and should not be used
Complete CRL
a list of certificates that have been revoked and should not be used
Infrastructure
a list of certificates that have been revoked and should not be used
CA domain
a list of certificates that have been revoked and should not be used
Entity authentication
a list of certificates that have been revoked and should not be used
S/MIME
a list of certificates that have been revoked and should not be used
Certificate repository
a list of certificates that have been revoked and should not be used
CPS pointer
a list of certificates that have been revoked and should not be used
Key history
a list of certificates that have been revoked and should not be used
CRL
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Complete CRL
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Infrastructure
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
CA domain
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Entity authentication
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
S/MIME
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Certificate repository
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
CPS pointer
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Key history
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
CRL
provides identification of the specific entity involved
Complete CRL
provides identification of the specific entity involved
Infrastructure
provides identification of the specific entity involved
CA domain
provides identification of the specific entity involved
Entity authentication
provides identification of the specific entity involved
S/MIME
provides identification of the specific entity involved
Certificate repository
provides identification of the specific entity involved
CPS pointer
provides identification of the specific entity involved
Key history
provides identification of the specific entity involved
CRL
the community served by a CA
Complete CRL
the community served by a CA
Infrastructure
the community served by a CA
CA domain
the community served by a CA
Entity authentication
the community served by a CA
S/MIME
the community served by a CA
Certificate repository
the community served by a CA
CPS pointer
the community served by a CA
Key history
the community served by a CA
CRL
a process that reliably and securely stores keying material even though the certificate is expired
Complete CRL
a process that reliably and securely stores keying material even though the certificate is expired
Infrastructure
a process that reliably and securely stores keying material even though the certificate is expired
CA domain
a process that reliably and securely stores keying material even though the certificate is expired
Entity authentication
a process that reliably and securely stores keying material even though the certificate is expired
S/MIME
a process that reliably and securely stores keying material even though the certificate is expired
Certificate repository
a process that reliably and securely stores keying material even though the certificate is expired
CPS pointer
a process that reliably and securely stores keying material even though the certificate is expired
Key history
a process that reliably and securely stores keying material even though the certificate is expired
CRL
the underlying foundation or basic framework for a large environment
Complete CRL
the underlying foundation or basic framework for a large environment
Infrastructure
the underlying foundation or basic framework for a large environment
CA domain
the underlying foundation or basic framework for a large environment
Entity authentication
the underlying foundation or basic framework for a large environment
S/MIME
the underlying foundation or basic framework for a large environment
Certificate repository
the underlying foundation or basic framework for a large environment
CPS pointer
the underlying foundation or basic framework for a large environment
Key history
the underlying foundation or basic framework for a large environment
CRL
the simplest form of CRL
Complete CRL
the simplest form of CRL
Infrastructure
the simplest form of CRL
CA domain
the simplest form of CRL
Entity authentication
the simplest form of CRL
S/MIME
the simplest form of CRL
Certificate repository
the simplest form of CRL
CPS pointer
the simplest form of CRL
Key history
the simplest form of CRL
CRL
publishes certificates so that users can find them
Complete CRL
publishes certificates so that users can find them
Infrastructure
publishes certificates so that users can find them
CA domain
publishes certificates so that users can find them
Entity authentication
publishes certificates so that users can find them
S/MIME
publishes certificates so that users can find them
Certificate repository
publishes certificates so that users can find them
CPS pointer
publishes certificates so that users can find them
Key history
publishes certificates so that users can find them
CRL
provides a consistent way to send and receive secure MIME data in e-mail
Complete CRL
provides a consistent way to send and receive secure MIME data in e-mail
Infrastructure
provides a consistent way to send and receive secure MIME data in e-mail
CA domain
provides a consistent way to send and receive secure MIME data in e-mail
Entity authentication
provides a consistent way to send and receive secure MIME data in e-mail
S/MIME
provides a consistent way to send and receive secure MIME data in e-mail
Certificate repository
provides a consistent way to send and receive secure MIME data in e-mail
CPS pointer
provides a consistent way to send and receive secure MIME data in e-mail
Key history
provides a consistent way to send and receive secure MIME data in e-mail
CRL
سؤال
42)Explain the main characteristics of indirect CRLs.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Essential Public Key Infrastructure
1
12)If a CA creates a certificate that is signed by its own private key, it is commonly known as a(n) ____.

A) intermediate CA
B) self-signed CA
C) mid-level CA
D) domain CA
B
2
1)The foundation of PKI was established approximately 30 years ago with the invention of private key cryptography.
False
3
7)The core services provided by PKI are ____ , integrity and confidentiality.

A) authentication
B) authorization
C) availability
D) nonrepudiation
A
4
2)The most common method of entity authentication is a prompting for a user ID and password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
13)A CA certificate signed by another CA's private key is referred as a(n) ____ .

A) self-signed CA
B) root CA
C) intermediate CA
D) top-level CA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
20)The ____ phase ensures that the private key and public key certificates created are used correctly and efficiently in the PKI community.

A) registration
B) issued
C) initialization
D) cancellation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
6)Digital signature provides not only data origin authentication but also data ____.

A) availability
B) entity confidentiality
C) integrity
D) confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
3)The fundamental premise of public key cryptography is to provide secure communication between strangers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
11)____ is the certification of a document as authentic and true by a public official known as a "notary public."

A) Trusted source
B) Nonrepudiation
C) Authentication
D) Notarization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
15)A(n) ____ creates key pairs and also implements backup and recovery of private keys.

A) CRL server
B) certificate bank
C) key management server
D) OCSP server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
14)Any method of publishing a certificate without a network-access protocol can be classified as ____ sharing.

A) in-line
B) real-time
C) mail-based
D) out-of-band
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
9)The technical term "____" refers to communications that occur outside of previously established communications method or channel.

A) real-time
B) in-line
C) in-band
D) out-of-band
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
5)Key and certificate life cycle management must be in place to enable public key cryptography to be used correctly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
16)An X.509 v3 certificate ____ extension is a bit string used to indicate the usage supported by the public key of this certificate.

A) certificate policies
B) key usage
C) private key usage period
D) policy mappings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
10)____ is a service that provides the assurance that an entity remains honest about its actions.

A) Nonrepudiation
B) Availability
C) Integrity
D) Confidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
8)____ authentication means that only a single assurance method is used for authentication.

A) Simple
B) Single-factor
C) Entity
D) Data origin
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
18)The ____ is intended for displaying information to a replying party when a certificate is used.

A) URI qualifier
B) CPS pointer
C) user notice qualifier
D) OID statement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
4)The initial creation of the public and private key pair is usually performed in the certificate authority's system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
17)____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.

A) Name constraints
B) Policy mappings
C) Policy constraints
D) Basic constraints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
19)____ is the process in which the identity of an end entity is established and verified.

A) Registration
B) Keying material generation
C) Certificate creation
D) Certificate distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
39)Briefly describe the main characteristics of an authority revocation list.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
34)What are the four assurance methods? Give examples of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
23)____ is a publishing method in which revocation information is updated and posted for entities in the PKI community to obtain.

A) OCSP
B) CPS
C) PKCS
D) CRL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
27)____________________ is the assurance that an entity is who it claims to be.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
35)Alice is sending a message to Bob. How can Alice ensure data integrity?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
36)What are some of the common tasks of a registration authority?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the most common approaches to provide PKI client functionalities?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
38)Briefly explain the certificate expiration task of the key and certificate life cycle management cancellation phase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
26)The PKIX Working Group was established in the fall of 1995 under the standard organization ____.

A) ACM
B) ISO
C) IEEE
D) IETF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
21)The key and certificate life cycle management concludes with the ____ phase.

A) issued
B) registration
C) certification
D) cancellation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
41)What are the three most common methods for implementing Delta CRL?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
25)A(n) ____ creates an immediate layer of abstraction for storing revocation information in a more flexible way.

A) partitioned CRL
B) complete CRL
C) redirect CRL
D) indirect CRL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
22)____ is the most common method of certificate revocation.

A) CRL
B) OCSP
C) ODI
D) CPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
29)The _________________________ is the centerpiece and the most critical component of a PKI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
28)____________________ is the assurance of data privacy and is usually provided by symmetric cryptography using algorithms such as AES and 3DES.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
40)What are the steps required to use a CRL DP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
31)____________________ occurs between the time of learning that the certificate should be revoked and the time that the revocation information is actually posted for the relying parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
24)CRL distribution point (CRL DP) is also called ____.

A) complete CRL
B) partitioned CRL
C) ARL CRL
D) indirect CRL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
30)A(n) ____________________ provides a common trusted source for anyone in the PKI community to retrieve certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
33)What are the general requirements a security infrastructure must satisfy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a list of certificates that have been revoked and should not be used
Complete CRL
a list of certificates that have been revoked and should not be used
Infrastructure
a list of certificates that have been revoked and should not be used
CA domain
a list of certificates that have been revoked and should not be used
Entity authentication
a list of certificates that have been revoked and should not be used
S/MIME
a list of certificates that have been revoked and should not be used
Certificate repository
a list of certificates that have been revoked and should not be used
CPS pointer
a list of certificates that have been revoked and should not be used
Key history
a list of certificates that have been revoked and should not be used
CRL
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Complete CRL
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Infrastructure
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
CA domain
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Entity authentication
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
S/MIME
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Certificate repository
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
CPS pointer
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
Key history
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
CRL
provides identification of the specific entity involved
Complete CRL
provides identification of the specific entity involved
Infrastructure
provides identification of the specific entity involved
CA domain
provides identification of the specific entity involved
Entity authentication
provides identification of the specific entity involved
S/MIME
provides identification of the specific entity involved
Certificate repository
provides identification of the specific entity involved
CPS pointer
provides identification of the specific entity involved
Key history
provides identification of the specific entity involved
CRL
the community served by a CA
Complete CRL
the community served by a CA
Infrastructure
the community served by a CA
CA domain
the community served by a CA
Entity authentication
the community served by a CA
S/MIME
the community served by a CA
Certificate repository
the community served by a CA
CPS pointer
the community served by a CA
Key history
the community served by a CA
CRL
a process that reliably and securely stores keying material even though the certificate is expired
Complete CRL
a process that reliably and securely stores keying material even though the certificate is expired
Infrastructure
a process that reliably and securely stores keying material even though the certificate is expired
CA domain
a process that reliably and securely stores keying material even though the certificate is expired
Entity authentication
a process that reliably and securely stores keying material even though the certificate is expired
S/MIME
a process that reliably and securely stores keying material even though the certificate is expired
Certificate repository
a process that reliably and securely stores keying material even though the certificate is expired
CPS pointer
a process that reliably and securely stores keying material even though the certificate is expired
Key history
a process that reliably and securely stores keying material even though the certificate is expired
CRL
the underlying foundation or basic framework for a large environment
Complete CRL
the underlying foundation or basic framework for a large environment
Infrastructure
the underlying foundation or basic framework for a large environment
CA domain
the underlying foundation or basic framework for a large environment
Entity authentication
the underlying foundation or basic framework for a large environment
S/MIME
the underlying foundation or basic framework for a large environment
Certificate repository
the underlying foundation or basic framework for a large environment
CPS pointer
the underlying foundation or basic framework for a large environment
Key history
the underlying foundation or basic framework for a large environment
CRL
the simplest form of CRL
Complete CRL
the simplest form of CRL
Infrastructure
the simplest form of CRL
CA domain
the simplest form of CRL
Entity authentication
the simplest form of CRL
S/MIME
the simplest form of CRL
Certificate repository
the simplest form of CRL
CPS pointer
the simplest form of CRL
Key history
the simplest form of CRL
CRL
publishes certificates so that users can find them
Complete CRL
publishes certificates so that users can find them
Infrastructure
publishes certificates so that users can find them
CA domain
publishes certificates so that users can find them
Entity authentication
publishes certificates so that users can find them
S/MIME
publishes certificates so that users can find them
Certificate repository
publishes certificates so that users can find them
CPS pointer
publishes certificates so that users can find them
Key history
publishes certificates so that users can find them
CRL
provides a consistent way to send and receive secure MIME data in e-mail
Complete CRL
provides a consistent way to send and receive secure MIME data in e-mail
Infrastructure
provides a consistent way to send and receive secure MIME data in e-mail
CA domain
provides a consistent way to send and receive secure MIME data in e-mail
Entity authentication
provides a consistent way to send and receive secure MIME data in e-mail
S/MIME
provides a consistent way to send and receive secure MIME data in e-mail
Certificate repository
provides a consistent way to send and receive secure MIME data in e-mail
CPS pointer
provides a consistent way to send and receive secure MIME data in e-mail
Key history
provides a consistent way to send and receive secure MIME data in e-mail
CRL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)Explain the main characteristics of indirect CRLs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.