Page 614 - StudyBook.pdf
P. 614

598    Chapter 10 • Public Key Infrastructure

                 A. Every escrow agent gets a copy of the key.

                 B. M of n control, where m is 3 and n is 5.
                 C. Every escrow agent gets a fifth of the key, and you keep copies of those
                    parts of the key so that you can fill in for unreachable agents.
                 D. Keep an extra copy of the key with family members, without telling them
                    what it is.

             4. What statement best describes the transitive trust in a simple CA model?

                 A. Users trust certificate holders, because the users and the certificate holders
                    each trust the CA.

                 B. Users trust certificate holders, because the users trust the CA, and the CA
                    trusts the certificate holders.
                 C. Certificate holders trust users, because the certificate holders trust the CA
                    and the CA trusts its users.
                 D. Users trust certificate holders, because the certificate holders have been
                    introduced to the users by the CA.

             5. In a children’s tree-house club, new members are admitted to the club on the
                 basis of whether they know any existing members of the club.What form of
                 PKI would be most analogous to this?

                 A. A hierarchical CA model
                 B. A chain of trust

                 C. A simple CA model
                 D. A Web of trust

             6. In a hierarchical CA model, which servers will use self-signed certificates to
                 identify themselves?
                 A. Root CAs

                 B. Intermediate CAs
                 C. Leaf CAs
                 D. Subordinate CAs

                 E. All CAs






          www.syngress.com
   609   610   611   612   613   614   615   616   617   618   619