COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
An Internet user must trust that the public key they use is accurate
|
|
A list of trusted certificate authorities is created by a browser over time.
|
|
A certificate authority trusts a public key if it has been approved by a different party.
|
|
A certificate authority is trusted by the owner of the certificate and the party relying on the certificate.
|
Detailed explanation-1: -In the hierarchical trust model everybody’s certificate is issued by a third party called Certificate Authority (CA). If one trust the CA then he automatically trust the certificates that CA issues. This is a simplified form of hierarchical trust model.
Detailed explanation-2: -A certificate authority trusts a public key if it has been approved by a different party. A certificate authority is trusted by the owner of the certificate and the party relying on the certificate.
Detailed explanation-3: -A certificate authority (CA) is a trusted organization that issues digital certificates for websites and other entities.
Detailed explanation-4: -The browser examines each certificate in the chain that terminates with a self-signed Trusted Root Certificate of the Certification Authority. This would be in the local certificate store.