Which of the following correctly describes the importance of eliminating marks that classify a master key?
a. It is imperative to follow ideal key management procedures
b. An attacker will know which type of door locks the key opens
c. It allows for easier tracking of keys within an organization
d. The attacker will not be able to duplicate the key
Answer: a. It is imperative to follow ideal key management procedures
Learn More :
Cyber Security
- What is the purpose of suspending a digital certificate rather than revoking it?
- How does an attacker successfully alter a message that was sent with a digital certificate?
- What is concerning about entry-level certificates?
- On which of the following devices is IPsec likely to be implemented?
- Which of the following is used to digitally sign a certificate?
- If a browser cannot connect to the OSCP responder, what does the browser receive in return?
- Why would an administrator NOT renew a key?
- What is involved in key escrow?
- A hierarchical trust model signs digital certificate authorities with how many keys?
- PKI consists of all of the following EXCEPT what?
- Which of the following does a digital certificate NOT contain?
- How can an EV SSL help users avoid dangerous sites?
- Why is a pre-master secret an important component of a web browser and web server handshake?
- Why would an administrator choose to use multiple Registration Authorities when processing certificate requests?
- Public Key Cryptography Standards are based on which of the following?
- Where are private keys NOT stored?
- How are TLS and SSL currently different in regards to security?
- What is the biggest difference between a CA and an RA?
- Which of the following is provided by a server digital certificate?
- Which of the following explains the importance of a "facilitator?"
- NTRUEncrypt is based on which cryptography method?
- "Plaintext" is a term that is best described as what?
- Which of the following is an advantage of the Keccak algorithm?
- What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet?
- Why is a homoalphabetic substitution considered a stream cipher?