Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 116
نمايش فراداده

Q&A

1:

How can the exchange of public keys be secured without PKI?

2:

Describe briefly the concept of trusted introducing.

3:

Describe briefly the concept of a trusted third party.

4:

PKIs can form different topologies of trust. List three different topologies.

5:

Explain the PKI enrollment procedure.

6:

Describe three enrollment protocols that are commonly used today.

7:

Give at least three reasons for placing a certificate on a CRL.

8:

Describe the steps needed to put a certificate on a CRL.

9:

How can you view and verify the certificate of a certain site?