1.
Which of the following protocols provides transport security for virtual terminal emulation?
2.
Deploying a wildcard certificate is one strategy to:
3.
Which of the following actions in PKI takes a certificate authority?
4.
Which of the following is used to certify intermediate authorities in a large PKI deployment?
5.
Which of the following components MUST be trusted by all parties in PKI?
6.
Company employees are required to have workstation client certificates to access a bank website. These certificates were backed up as a precautionary step before the new computer upgrade. After the upgrade and restoration, users state they can access the bank's website, but not login. Which is the following is MOST likely the issue?
7.
A company's security administrator wants to manage PKI for internal systems to help reduce costs. Which of the following is the FIRST step the security administrator should take?
8.
Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate?
9.
When reviewing a digital certificate for accuracy, which of the following would Matt, a security administrator, focus on to determine who affirms the identity of the certificate owner?
10.
Joe, a user, reports to the system administrator that he is receiving an error stating his certificate has been revoked. Which of the following is the name of the database repository for these certificates?