Describe three functions of a certificate authority (CA).

What will be an ideal response?


The CA performs many housekeeping activities regarding the use of keys and certificates that are issued and used in the zone of authority for which it is established. Each user authenticates him or herself with the CA, and the CA can issue new or replacement keys, track issued keys, provide a directory of public-key values for all known users, and perform other management activities. When a private key is compromised or when the user loses the privilege of using keys in the area of authority, the CA can revoke the user's keys. The CA periodically distributes a certificate revocation list (CRL) to all users. When important events occur, specific applications can make a real-time request to the CA to verify any user against the current CRL.

Computer Science & Information Technology

You might also like to view...

The _________, _________ and _________ of an operator cannot be changed by overloading the operator.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a custom web app, and what is required to build a custom web app?

What will be an ideal response?

Computer Science & Information Technology

Whenever inheritance is used, the subclass must fit into a(n) ____ relationship with the base class.

A. equivalence B. "has-a" C. helper D. "is-a"

Computer Science & Information Technology

Which of the following information is not necessary in order to perform (i.e. invoke) a readBlock operation?

a) buffer b) file c) block number d) the data contained in the block

Computer Science & Information Technology