Lesson 6 Implementing Public Key Infrastructure
Lesson 6 Implementing Public Key Infrastructure
1. An employee handles key management and has learned that a user has
used the same key pair for encrypting documents and digitally signing
emails. Prioritize all actions that should be taken and determine the first
action that the employee should take.
A. Revoke the keys.
B. Generate a new key pair.
C. Recover the encrypted data.
D. Generate a new certificate.
2. A website with many subdomains has been issued a web server certificate
for domain validation. This certificate verifies the parent domain and all
subdomains (to a single level). This certificate is also known as which of
the following?
A. SAN certificate
B. Wildcard certificate
C. Root certificate
D. Code signing certificate
3. If not managed properly, certificate and key management can represent a
critical vulnerability. Assess the following statements about key
management and select the true statements. (Select all that apply.)
A. If a key used for signing and encryption is compromised, it can be easily
destroyed with a new key issued.
B. It is exponentially more difficult to ensure the key is not compromised with
multiple backups of a private key.
C. If a private key, or secret key, is not backed up, the storage system represents a
single point of failure.
D. A compromised private key that encrypts data is of no concern if the same key
signs documents.
4. A Certificate Revocation List (CRL) has a publish period set to 24 hours.
Based on the normal procedures for a CRL, what is the most applicable
validity period for this certificate?
A. 26 hours
B. 1 hour
C. 23 hours
D. 72 hours
5. A company has a critical encryption key that has an M-of-N control
configuration for protection. Examine the examples and select the one that
correctly illustrates the proper configuration for this type of protection of
critical encryption keys.
A. M=1 and N=5
B. M=3 and N=5
C. M=6 and N=5
D. M=0 and N=5
6. What is the purpose of a web server certificate?
A. Sign and encrypt email messages.
B. Guarantee the validity of a browser plug-in.
C. Provide identification of the certificate authority.
D. Guarantee the identity of a website.
7. Digital certificates are based on the X.509 standard that defines the fields
(or information) about a subject (or entity using the certificate) and the
certificate’s issuer. Which of the following fields would not be included in a
standard public certificate?
A. Extensions
B. Public key
C. Endorsement key
D. Subject
8. Consider the life cycle of an encryption key. Which of the following is NOT
a stage in a key's life cycle?
A. Storage
B. Verification
C. Expiration and renewal
D. Revocation
9. A web administrator visits a website after installing its certificate to test the
SSL binding. The administrator's client computer did not trust the website's
certificate. The administrator views the website's certificate from the
browser to determine which certificate authority (CA) generated the
certificate. Which certificate field would assist with the troubleshooting
process?
A. Subject alternative name
B. Signature algorithm
C. Issuer
D. Subject
10. An employee handling key management discovers that a private key has
been compromised. Evaluate the stages of a key's life cycle and determine
which stage the employee initiates upon learning of the compromise.
A. Certificate generation
B. Key generation
C. Expiration and renewal
D. Revocation
11. An employee has requested a digital certificate for a user to access the
Virtual Private Network (VPN). It is discovered that the certificate is also
being used for digitally signing emails. Evaluate the possible extension
attributes to determine which should be modified so that the certificate only
works for VPN access.
A. Valid from/to
B. Extended key usage
C. Serial number
D. Public key
1.B
The first and immediate action should be to generate a new key pair for the
user. This helps ensure that the compromised key is no longer used for both
encryption and digital signing. It's crucial to separate these functions for
security reasons.
After generating a new key pair, the old, compromised keys should be
revoked. This prevents any further use of the compromised keys and informs
others in the system that these keys are no longer valid.
After the new key pair is in place and the old keys are revoked, efforts can be
made to recover any encrypted data that was created using the compromised
key. This may involve re-encrypting the data with the new key pair and
ensuring proper access controls are maintained.
If the user's key pair is associated with a digital certificate, it's advisable to
generate a new certificate to go along with the new key pair. This ensures that
the certificate is linked to the fresh key pair, strengthening the security of both
encryption and digital signatures.
2.B
The root certificate is the one that identifies the certificate authority (CA) itself.
The root certificate is self-signed. A root certificate would normally use a key
size of at least 2048 bits.
3.BC
A problem with key storage is the difficulty associated with multiple backups of
a private key. It is exponentially more difficult to ensure the key is not
compromised in this situation.
If a key is not backed up, it represents a single point of failure. Key recovery is
a process for backing up keys and/or recovering data encrypted with a lost
key.
If a key is compromised and is used for signing only, it can be destroyed, and
a new key issued. A key used for encryption cannot be destroyed so easily.
The encrypted data has to be recovered first.
If the private key used to both encrypt and sign a document is compromised,
both uses of the key are of great security risk and may provide external
threats more access to private data.
4.A
One or two hours over the publish period is considered normal thus making 26 hours
within the window.
The validity period is the period during which the CRL is considered authoritative.
This is usually a bit longer than the publish period, giving a short window to update
and keep the CRL authoritative.
The validity period would not be less than the publish period as it would make the
CRL nonauthoritative prior to the next publishing.
If the validity period was set to 72 hours this would be much too long after the publish
period. The CRL would be published two additional times prior to the validity period
ending.
5.B
A correct configuration for an M-of-N control is M=3 and N=5. M stands for the
number of authorized administrators that must be present to access the
critical encryption keys and N is the total number of authorized administrators.
In this scenario, 3 of the 5 administrators must be present for access.
M is always greater than 1 for this type of configuration making M=1 and N=5
not a valid choice. If only 1 administrator must be present, this configuration
would be unnecessary.
M=6 and N=5 is not possible as this configuration is asking for more
administrators to be present than is authorized.
The final option of M=0 is not viable because M must always equal more than
1
6.D
A web server certificate guarantees the identity of the server that provides
web services like a website or e-commerce sites. The web server’s public
certificate allows users to submit data securely to the web server.
A root certificate identifies the certificate authority (CA) and is self-signed. The
operating system or browser mark self-signed certificates as untrusted, but an
administrative user can choose to override this.
7.C
The Public key field denotes the public key and algorithm used by the
certificate holder. This key is distributed to the public to initiate a secure
connection with a website or remote server.
8.B
Verification is not a stage in a key’s life cycle. It is part of the software development
life cycle. The stages are: key generation, certificate generation, storage, revocation,
and expiration and renewal.
Storage is the stage where a user must take steps to store the private key securely. It is
also important to ensure that the private key is not lost or damaged.
The expiration and renewal stage addresses that a key pair expires after a certain
period. Giving the key a "shelf-life" increases security. Certificates can be renewed
with new key material.
Revocation is the stage that concerns itself with the event of a private key being
compromised; it can be revoked before it expires.
9.C
The Issuer field provides the name of the certificate authority (CA) that
generated and issued the certificate for the web server.
The subject alternative name (SAN) displays the extension field to identify the
domain name system (DNS) name or names by which a host is identified.
The Signature algorithm field displays the algorithm used by the certificate
authority to sign the certificate.
The Subject field displays the name of the certificate holder, expressed as a
distinguished name (DN). The common name (CN) in this part would match
the fully qualified domain name (FQDN) of the server or a user email address.
10.D
Key generation occurs during the initial distribution of the key, or after having
revoked one.
Expiration and renewal are used for a key pair that has not been revoked or
expired after a certain period. A given shelf-life increases security.
11.B
Set the Extended Key Usage (EKU) field of a certificate to define its usage.
Applications such as virtual private network (VPN) or email clients may
require specific requirements for key usage configuration.
The validity field displays the date and time during which the certificate is
valid. Certificates are issued with a limited duration, as set by the certificate
authority (CA) policy for the certificate type.
The serial number is a number uniquely identifying the certificate within the
domain of its CA. This prevents a CA from generating duplicate certificates.
The public key field displays the public key and algorithm used by the
certificate holder. This key can be shared with other clients and users on the
public network.