Question
a.
cipher message protocol
b.
cipher management protocol
c.
certificate message protocol
d.
none of the mentioned
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. CMP stands for
Similar Questions
Discover Related MCQs
Q. How many functions are involved in the PKIX architectural model?
View solution
Q. Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?
View solution
Q. The period of validity consists of the date on which the certificate expires.
View solution
Q. The issuer unique identifier of the X.509 certificates was added in which version?
View solution
Q. X.509 certificate recommends which cryptographic algorithm?
View solution
Q. A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____
View solution
Q. How many handshake rounds are required in the Public-Key Distribution Scenario?
View solution
Q. “Conveys any desired X.500 directory attribute values for the subject of this certificate.”
Which Extension among the following does this refer to?
View solution
Q. The criticality indicator indicates whether an extension can be safely ignored.
View solution
Q. Which of the following is not a part of an Extension?
View solution
Q. CRL stands for
View solution
Q. It is desirable to revoke a certificate before it expires because
View solution
Q. Certificates generated by X that are the certificates of other CAs are Reverse Certificates.
View solution
Q. Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –
View solution
Q. Which of the following is not an element/field of the X.509 certificates?
View solution
Q. The subject unique identifier of the X.509 certificates was added in which version?
View solution
Q. Extensions were added in which version?
View solution
Q. Publicly Available directory is more secure than which other system?
View solution
Q. Which system uses a trusted third party interface?
View solution
Q. Which of these systems use timestamps as an expiration date?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!