Page 615 - StudyBook.pdf
P. 615
Public Key Infrastructure • Chapter 10 599
7. Where would you search to find documentation on the formats in which cer-
tificates and keys can be exchanged?
A. ITU X.500 standards.
B. Internet Requests For Comment (RFCs).
C. PKCS standards.
D. ITU X.509 standards.
E. Internet Drafts.
8. Which of the following certificate lifecycle events is best handled without
revoking the certificate?
A. The contact e-mail address for the certificate changes to a different person.
B. The certificate reaches its expiry date.
C. The company represented by the certificate moves to a new town in the
same state.
D. The certificate’s private key is accidentally posted in a public area of the
Web site.
9. If you are following best PKI practices, which of the following would require a
certificate to be revoked?
A. The private key is destroyed in an unfortunate disk crash.
B. The certificate has been found circulating on an underground bulletin
board.
C. The private key was left on a laptop that was stolen, then recovered.
D. A new certificate is generated for the same private key
10. Which is an example of m of n control?
A. A personal check book for an individual.
B. A business check book, requiring signatures of two principals.
C. A locked door with a dead-bolt.
D. A bank vault with a time lock that allows opening at three separate times
within a week.
www.syngress.com