Page 613 - StudyBook.pdf
P. 613

Public Key Infrastructure • Chapter 10  597


                 A: The bottom line is it does not have to be destroyed. However, imagine what
                    would happen if you decided to no longer use a particular credit card. If you
                    left the credit card active and did not destroy it, an unauthorized party could
                    potentially use it.The same is true of unused key pairs.


                 Q: Which is better, software storage for private keys or hardware storage?
                 A: As a rule of thumb, hardware storage is always better since in theory, there is a
                    greater potential for keys to be compromised using software storage. However,
                    hardware storage costs money, and generally has protections against porting the
                    private key to a new location if this is required.


                 Self Test



                 A Quick Answer Key follows the Self Test questions. For complete
                 questions, answers, and explanations to the Self Test questions in this
                 chapter as well as the other chapters in this book, see the Self Test
                 Appendix.

                 1. You are applying for a certificate for the Web server for your company.Which
                    of these parties would you not expect to be contacting in the process?

                      A. A registration authority (RA)
                      B. A leaf CA

                      C. A key escrow agent
                      D. A root CA

                 2. What portion of the information in your certificate should be kept private?
                      A. All of it. It is entirely concerned with your private information.

                      B. None of it.There is nothing private in the certificate.
                      C. The thumbprint, that uniquely identifies your certificate.
                      D. The public key listed in the certificate.


                 3. In creating a key recovery scheme that should allow for the possibility that as
                    many as two of the five key escrow agents are unreachable, what scheme is
                    most secure to use?






                                                                              www.syngress.com
   608   609   610   611   612   613   614   615   616   617   618