121. Public key technology and digital certificates do
a.
Authenticationb.
Nonrepudiationc.
Availabilityd.
Data integrity122. Quantum cryptography could be a possible replacement for public key algorithms used in which of the following computing environments?
a.
Utility computingb.
On-demand computingc.
Quantum computingd.
Virtual computingQuantum computing deals with large word size quantum computers in which the security of integer factorization and discrete log-based public-key cryptographic algorithms would be threatened. This would be a major negative result for many cryptographic key management systems that rely on these algorithms for the establishment of cryptographic keys. Lattice-based public-key cryptography would be resistant to quantum computing threats.
Utility computing means allowing users to access technology-based services without much technical knowledge. On-demand computing deals with providing network access for self-services. Virtual computing uses virtual machine with software that allows a single host to run one or more guest operating systems. Utility computing, on-demand computing, and virtual computing are part of cloud computing.
123. Which of the following is good practice for organizations issuing digital certificates?
a.
Develop a consulting agreement.b.
Develop an employment agreement.c.
Develop a subscriber agreement.d.
Develop a security agreement.124. Which of the following is required to accept digital certificates from multiple vendor certification authorities?
a.
The application must be PKI-enabled.b.
The application must be PKI-aware.c.
The application must use X.509 Version 3.d.
The application must use PKI-vendor plug-ins.125. Which of the following is primarily required for continued functioning of a public key infrastructure (PKI)?
a.
Disaster recovery plansb.
Service level plansc.
Fraud prevention plansd.
Legal liability plans