1: | How can the exchange of public keys be secured without PKI? |
2: | Describe briefly the concept of trusted introducing. |
3: | Describe briefly the concept of a trusted third party. |
4: | PKIs can form different topologies of trust. List three different topologies. |
5: | Explain the PKI enrollment procedure. |
6: | Describe three enrollment protocols that are commonly used today. |
7: | Give at least three reasons for placing a certificate on a CRL. |
8: | Describe the steps needed to put a certificate on a CRL. |
9: | How can you view and verify the certificate of a certain site? |