A ___________ is a specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.
____________ performs a real-time lookup of a digital certificate's status.
________________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
Which of these is considered the weakest cryptographic transport protocol?
The strongest technology that would assure Alice that Bob is the sender of a message is a(n) ________.
A digital certificate associates ____________.
Digital certificates can be used for each of these EXCEPT ____________.
An entity that issues digital certificates is a ___________.
A centralized directory of digital certificates is called a(n) ______________.
In order to ensure a secure cryptographic connection between a web browser and a web server, a(n) _________ would be used.
A digital certificate that turns the address bar green is a(n) ____________.
The __________ party trust model supports CA.
Public Key Cryptography Standards (PKCS) _______________.
Which statement is NOT true regarding hierarchical trust models?
Which statement is NOT where keys can be stored?
Public key infrastructure (PKI) ____________.
A(n) _______________ is a published set of rules that govern the operation of a PKI.
Which of these is NOT part of the certificate life cycle?
________________ refers to a situation in which keys are managed by a third party, such as a trusted CA.
________________ is a protocol for securely accessing a remote computer.