Matching
Match each item with a statement below:
Premises:
a list of certificates that have been revoked and should not be used
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
provides identification of the specific entity involved
the community served by a CA
a process that reliably and securely stores keying material even though the certificate is expired
the underlying foundation or basic framework for a large environment
the simplest form of CRL
publishes certificates so that users can find them
provides a consistent way to send and receive secure MIME data in e-mail
Responses:
CA domain
Key history
Entity authentication
Infrastructure
Certificate repository
Complete CRL
S/MIME
CRL
CPS pointer
Correct Answer:
Premises:
Responses:
a list of certificates that have been revoked and should not be used
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
provides identification of the specific entity involved
the community served by a CA
a process that reliably and securely stores keying material even though the certificate is expired
the underlying foundation or basic framework for a large environment
the simplest form of CRL
publishes certificates so that users can find them
provides a consistent way to send and receive secure MIME data in e-mail
Premises:
a list of certificates that have been revoked and should not be used
a uniform resource identifier (URI) that points to a CPS published by the issuing CA
provides identification of the specific entity involved
the community served by a CA
a process that reliably and securely stores keying material even though the certificate is expired
the underlying foundation or basic framework for a large environment
the simplest form of CRL
publishes certificates so that users can find them
provides a consistent way to send and receive secure MIME data in e-mail
Responses:
Related Questions
Q32: A(n) _ creates an immediate layer of
Q33: _ is the most common method of
Q34: The _ is the centerpiece and the
Q35: _ is the assurance of data privacy
Q36: What are the steps required to use
Q37: _ occurs between the time of learning
Q38: CRL distribution point (CRL DP) is also
Q39: A(n) _ provides a common trusted source
Q40: What are the general requirements a security
Q42: Explain the main characteristics of indirect CRLs.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents