ExamGecko
Question list
Search
Search

Related questions











Question 113 - 212-81 discussion

Report
Export

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and C

A.
Receives request, authenticates it and forwards it to the CA.
Answers
A.
Receives request, authenticates it and forwards it to the CA.
B.
PKI (Public Key Infrastructure)
Answers
B.
PKI (Public Key Infrastructure)
C.
TTP (Trusted Third Party)
Answers
C.
TTP (Trusted Third Party)
D.
RA (Registration Authority)
Answers
D.
RA (Registration Authority)
E.
CP (Certificate Policy)
Answers
E.
CP (Certificate Policy)
Suggested answer: C

Explanation:

RA (Registration Authority)

https://en.wikipedia.org/wiki/Registration_authority

Registration authorities exist for many standards organizations, such as ANNA (Association of National Numbering Agencies for ISIN), the Object Management Group, W3C, IEEE and others. In general, registration authorities all perform a similar function, in promoting the use of a particular standard through facilitating its use. This may be by applying the standard, where appropriate, or by verifying that a particular application satisfies the standard's tenants. Maintenance agencies, in contrast, may change an element in a standard based on set rules -- such as the creation or change of a currency code when a currency is created or revalued (i.e. TRL to TRY for Turkish lira). The Object Management Group has an additional concept of certified provider, which is deemed an entity permitted to perform some functions on behalf of the registration authority, under specific processes and procedures documented within the standard for such a role.

Incorrect answers:

TTP (Trusted Third Party) - is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all critical transaction communications between the parties, based on the ease of creating fraudulent digital content. In TTP models, the relying parties use this trust to secure their own interactions. TTPs are common in any number of commercial transactions and in cryptographic digital transactions as well as cryptographic protocols, for example, a certificate authority (CA) would issue a digital identity certificate to one of the two parties in the next example. The CA then becomes the Trusted-Third-Party to that certificates issuance. Likewise transactions that need a third party recordation would also need a third-party repository service of some kind or another.

CP (Certificate Policy) - is a document which aims to state what are the different entities of a public key infrastructure (PKI), their roles and their duties. This document is published in the PKI perimeter.

When in use with X.509 certificates, a specific field can be set to include a link to the associated certificate policy. Thus, during an exchange, any relying party has an access to the assurance level associated with the certificate, and can decide on the level of trust to put in the certificate.

PKI (Public Key Infrastructure) - is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

asked 18/09/2024
ASDASDASDA SDASD
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first