Computer Science > QUESTIONS & ANSWERS > CompTIA Security+ SY0-601 Study Guide Questions with Complete solutions (All)

CompTIA Security+ SY0-601 Study Guide Questions with Complete solutions

Document Content and Description Below

CompTIA Security+ SY0-601 Study Guide Questions with Complete solutions CompTIA Security+ SY0-601 Study Guide Questions with Complete solutions What type of certificate does a CA have? -Answer- R... oot Certificate; used to sign keys If I am going to use a CA internally, what type of CA should I use? -Answer- Private CA If I want to carry out a B2B activity with third-party companies or sell products on the web, what type of certificate should I use? -Answer- Public CA Why would I make my CA offline when not in use? -Answer- Military, Security, or Banking Organizations; preventing data from being compromised. Who signs X.509 certificates? -Answer- Central Authorities (CA) Who builds the CA or intermediate authorities? -Answer- Architect What can I use to prevent my CA from being compromised and fraudulent certificates being issued? -Answer- Certificate Pinning If two entities what to set up a cross-certification, what must they set up first? -Answer- Root CAs using a bridge trust model What type of trust model does PGP use? -Answer- Web of Trust How can I tell if my certificate is valid? -Answer- Certificate Revocation List (CRL) If the CRL is going slow, what should I implement? -Answer- Online Certification Status Protocol (OCSP) Explain certificate stapling/OCSP stapling -Answer- Web servers use an OCSP for faster authentication bypassing the CRL What is the process of obtaining a new certificate -Answer- Certificate Signing Request (CSR) What is the purpose of key escrow? -Answer- Holds an provides access to 3rd party keys provided the need. What is the purpose of Hardware Security Model (HSM) -Answer- Used by key escrow to store and manage keys What is the purpose of DRA and what does it require in order to complete its role effectively? -Answer- When a users private key becomes corrupt, the DRA recovers data by obtaining a copy of the private key from the key escrow. [Show More]

Last updated: 2 years ago

Preview 1 out of 19 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

170
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 26, 2022

Number of pages

19

Written in

Seller


seller-icon
Excel

Member since 3 years

246 Documents Sold

Reviews Received
15
2
2
1
6
Additional information

This document has been written for:

Uploaded

Aug 26, 2022

Downloads

 0

Views

 170

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·