Intro to Cryptography WGU C839 Exam /Questions & Answers With All Chapters Graded A+ Full completed Document .
6 views 0 purchase
Course
Intro to Cryptography WGU C839 Exa
Institution
Intro To Cryptography WGU C839 Exa
Intro to Cryptography WGU C839 Exam /Questions &
Answers With All Chapters Graded A+ Full completed
Document .
Determining the path between X.509 digital certificates and a trusted root - CORRECT
ANSWERS -Delegated Path Discovery
The validation of the path to the trusted root according to a pa...
Intro to Cryptography WGU C839 Exam /Questions &
Answers With All Chapters Graded A+ Full completed
Document 2024-2025.
Determining the path between X.509 digital certificates and a trusted root - CORRECT
ANSWERS -Delegated Path Discovery
The validation of the path to the trusted root according to a particular validation policy -
CORRECT ANSWERS -Delegated Path Validation
Setup and initialization
Administration
Cancelation
are the phases of? - CORRECT ANSWERS -Key life-cycle
Key storage
Certificate retrieval and validation
Backup or escrow
Recovery - CORRECT ANSWERS -Administration Phase
Expiration
Renewal
Revocation
Suspension
Destruction - CORRECT ANSWERS -Cancelation and History Phase
Person who can recover keys from keystore on behalf of a user
Highly-trusted person
Issue recovery agent certificates
- EFS Recovery Agent certificate
- Key Recovery Agent Certificate - CORRECT ANSWERS -Update and Path
Vulnerabilities
The most basic form of authentication
User name and password are transmitted over the network and compared to a table of
corresponding name-password pairs.
Name-password pair table is encrypted, but the transmission of the passwords is done
in clear text, unencrypted.
It is the basic authentication feature for HTTP - CORRECT ANSWERS -PAP (Password
Authentication Protocol)
, This is a proprietary version of PAP, it is somewhat more secure then PAP because
username and passwords are both encrypted when they are sent over the network. -
CORRECT ANSWERS -S-PAP (Shiva Password Authentication Protocol)
After a connecting is established the authenticator will "challenge" the requestor.
The requestor responds with a calculated has function.
The authenticator checks the response against its own calculation of the expected hash
function. If they match the authenticator acknowledges the request, otherwise the
connection is terminated.
This processes is repeated at random intervals. - CORRECT ANSWERS -CHAP
(Challenge-Handshake Authentication Protocol)
These are usually the encryption of a message digest with the senders private key.
In order to verify them, the recipient uses the senders public key.
They are considered good if they provide the following.
Authentication
Integrity
Non-repudiation - CORRECT ANSWERS -Digital Signature
It is a digital document that contains a public key and some information to allow your
system to verify where they key came from.
This is the most common way to distribute pubic keys in asymmetric cryptography. -
CORRECT ANSWERS -Digital Certificate
uses asymmetric key pairs and combines software, encryption and services to provide a
means of protecting the security of business communications and transactions. -
CORRECT ANSWERS -PKI (Public Key Infrastructure)
They are in place by the RSA to ensure uniform certificate management throughout the
internet - CORRECT ANSWERS -PKCS (Public Key Cryptography Standards)
A certificate is a digital representation of information that identifies you as a relevant
entity by a? - CORRECT ANSWERS -Trusted Third Party (TTP)
This is an entity trusted by one or more users to manage certificates - CORRECT
ANSWERS -CA (Certificate Authority)
Used to take the burden off of a CA by handling verification prior to certificates being
issues. They act as a proxy between user and CA. They receive requests, authenticate
them and forward them to the CA - CORRECT ANSWERS -RA (Registration Authority)
is a set of rules that defines how a certificate may be used. - CORRECT ANSWERS -
CP (Certificate Policy)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller gideonngari. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.39. You're not tied to anything after your purchase.