COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
issuing certificates
|
|
revoking certificates
|
|
revoking licenses
|
|
issuing public-private key pairs
|
Detailed explanation-1: -A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.
Detailed explanation-2: -Explanation: The components of Public Key Infrastructure are CA, RSA, RA, and digital certificates. Therefore, XA is not a component of public key infrastructure (PKI).
Detailed explanation-3: -Custom is not one of the main PKI trust models.
Detailed explanation-4: -A Certificate Authority (CA) is a trusted third party that verifies the identity of an organization applying for a digital certificate. After verifying the organization’s identity, the CA issues a certificate and binds the organization’s identity to a public key.