Page 827 - StudyBook.pdf
P. 827

Self Test Appendix • Appendix  811


                  Intermediate CAs (answer B) are signed by another CA; Leaf CAs (answer C) are signed by the
                    intermediate or root CA above them; subordinate CAs (answer D) are signed by the CA above
                    them.Answer E – all CAs – cannot be true unless all A-D are true.

                 7.  Where would you search to find documentation on the formats in which certificates and keys
                    can be exchanged?
                      A. ITU X.500 standards.
                      B. Internet Requests For Comment (RFCs).
                      C. PKCS standards.
                      D. ITU X.509 standards.
                      E. Internet Drafts.
                  Answer C – the PKCS standards define formats for exchange of certificates, keys, and
                    encrypted information.
                  The ITU X.500 standard (answer A) defines addresses; X.509 (answer D) defines certificates,
                    but not the formats in which they are exchanged.The Internet Drafts (answer E) and Internet
                    RFCs (answer B) define a large number of protocols, but not all of the PKCS standards.

                 8.  Which of the following certificate lifecycle events is best handled without revoking the certifi-
                    cate?
                      A. The contact e-mail address for the certificate changes to a different person.
                      B. The certificate reaches its expiry date.
                      C. The company represented by the certificate moves to a new town in the same state.
                      D. The certificate’s private key is accidentally posted in a public area of the Web site.
                  Answer B.When the certificate reaches its expiry date, it naturally expires everywhere, and you
                    should already have requested a renewal certificate with a later expiry date.

                  The other answers are all reasons to revoke the certificate as soon as possible.Answer A, a
                    change of contact e-mail address, requires revoking the certificate to prevent the old e-mail
                    contact from being able to submit a request for a changed certificate; a change of address
                    (answer C) voids information in the certificate, so that it is no longer a true statement of iden-
                    tity; accidental (or deliberate) exposure of the private key to unauthorized parties results in the
                    certificate being unreliable as a uniquely identifying piece of information.

                 9.  If you are following best PKI practices, which of the following would require a certificate to be
                    revoked?
                      A. The private key is destroyed in an unfortunate disk crash.
                      B. The certificate has been found circulating on an underground bulletin board.
                      C. The private key was left on a laptop that was stolen, then recovered.
                      D. A new certificate is generated for the same private key







                                                                              www.syngress.com
   822   823   824   825   826   827   828   829   830   831   832