Page 614 - StudyBook.pdf
P. 614
598 Chapter 10 • Public Key Infrastructure
A. Every escrow agent gets a copy of the key.
B. M of n control, where m is 3 and n is 5.
C. Every escrow agent gets a fifth of the key, and you keep copies of those
parts of the key so that you can fill in for unreachable agents.
D. Keep an extra copy of the key with family members, without telling them
what it is.
4. What statement best describes the transitive trust in a simple CA model?
A. Users trust certificate holders, because the users and the certificate holders
each trust the CA.
B. Users trust certificate holders, because the users trust the CA, and the CA
trusts the certificate holders.
C. Certificate holders trust users, because the certificate holders trust the CA
and the CA trusts its users.
D. Users trust certificate holders, because the certificate holders have been
introduced to the users by the CA.
5. In a children’s tree-house club, new members are admitted to the club on the
basis of whether they know any existing members of the club.What form of
PKI would be most analogous to this?
A. A hierarchical CA model
B. A chain of trust
C. A simple CA model
D. A Web of trust
6. In a hierarchical CA model, which servers will use self-signed certificates to
identify themselves?
A. Root CAs
B. Intermediate CAs
C. Leaf CAs
D. Subordinate CAs
E. All CAs
www.syngress.com