121. Public key technology and digital certificates do
a. Authentication
b. Nonrepudiation
c. Availability
d. Data integrity
122. Quantum cryptography could be a possible replacement for public key algorithms used in which of the following computing environments?
a. Utility computing
b. On-demand computing
c. Quantum computing
d. Virtual computing
Quantum computing deals with large word size quantum computers in which the security of integer factorization and discrete log-based public-key cryptographic algorithms would be threatened. This would be a major negative result for many cryptographic key management systems that rely on these algorithms for the establishment of cryptographic keys. Lattice-based public-key cryptography would be resistant to quantum computing threats.
Utility computing means allowing users to access technology-based services without much technical knowledge. On-demand computing deals with providing network access for self-services. Virtual computing uses virtual machine with software that allows a single host to run one or more guest operating systems. Utility computing, on-demand computing, and virtual computing are part of cloud computing.
123. Which of the following is good practice for organizations issuing digital certificates?
a. Develop a consulting agreement.
b. Develop an employment agreement.
c. Develop a subscriber agreement.
d. Develop a security agreement.
124. Which of the following is required to accept digital certificates from multiple vendor certification authorities?
a. The application must be PKI-enabled.
b. The application must be PKI-aware.
c. The application must use X.509 Version 3.
d. The application must use PKI-vendor plug-ins.
125. Which of the following is primarily required for continued functioning of a public key infrastructure (PKI)?
a. Disaster recovery plans
b. Service level plans
c. Fraud prevention plans
d. Legal liability plans