Matching
Match each statement with the correct term below.
Premises:
The entity that issues the certificates
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
If an enterprise has more than one CA, this MMC can be used to manage all of them
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Very secure, but also resource intensive, requiring a lot of processing power
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Can be used by individual users to encrypt their data
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Specifically designed to support automatic request and retrieval of certificates for network devices
Responses:
asymmetric encryption
Enterprise PKI
CA
public key infrastructure
symmetric encryption
Network Device Enrollment service
EFS
Online responder
SCEP
Correct Answer:
Premises:
Responses:
The entity that issues the certificates
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
If an enterprise has more than one CA, this MMC can be used to manage all of them
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Very secure, but also resource intensive, requiring a lot of processing power
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Can be used by individual users to encrypt their data
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Specifically designed to support automatic request and retrieval of certificates for network devices
Premises:
The entity that issues the certificates
Uses a single key (often referred to as a session key) to encrypt and decrypt the data
If an enterprise has more than one CA, this MMC can be used to manage all of them
This MMC is used to manage the online responders that provide the CRL to requestors to validate certificates
Very secure, but also resource intensive, requiring a lot of processing power
Used to issue certificates to network devices such as routers that do not have accounts in Active Directory
Can be used by individual users to encrypt their data
Includes all of the technologies needed to create, issue, manage, store, and revoke certificates
Specifically designed to support automatic request and retrieval of certificates for network devices
Responses:
Related Questions
Q32: One or more people in an organization
Q33: Users in the _ role are granted
Q34: Explain how to deploy trusted root certificates
Q35: AD CS publishes a delta CRL once
Q36: Explain how the online responder service is
Q37: You can use the _ to view
Q38: List and describe two permissions that can
Q39: List and describe two AD CS role
Q40: Discuss how certificates issued to network devices
Q41: Describe restricted enrollment agents.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents