Just need answer, no need explanation: 5) Which of the following are valid reasons to revoke a certificate? Select all that apply. The certificate owner decides to change the encryption algorithm used to generate keys in the certificate, and doesn't want to permit the old version to still be used. The certificate has expired and needs to be reissued. The public key in the certificate is accidentally revealed. The private key corresponding to the public key in the certificate is accidentally revealed. 6) When Alice initiates communication with the website foo.com, foo.com sends Alice the site's certificate. Which of the following statements is true about this certificate? The certificate includes foo.com’s public key, signed by the CA’s private key. The certificate includes foo.com’s private key, signed by the CA's public key. The certificate includes foo.com’s public key, signed by Alice’s private key. The certificate includes foo.com’s public key, signed by foo.com’s private key. 7) When attempting to obtain a certificate from a CA (such as Let's Encrypt), one needs to prove ownership of the given domain. Which of the following are challenge options that can be used to prove one controls a domain? (Choose Two) The server owner provides an email address from the domain to the CA. The CA verifies email ownership by sending a text code to that email and requesting the server owner supply it back to them. The server owner adds a specific TXT record to the DNS records for the domain, as specified by the CA, which is then verified by the CA through a DNS lookup The server owner places a challenge token on the web server, as specified by the CA, which the CA then tries to access via HTTP The server owner provides a message to the CA signed with their private key, which the CA then verifies with the server owner's public key

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Just need answer, no need explanation:

5) Which of the following are valid reasons to revoke a certificate? Select all that apply.

The certificate owner decides to change the encryption algorithm used to generate keys in the certificate, and doesn't want to permit the old version to still be used.

The certificate has expired and needs to be reissued.

The public key in the certificate is accidentally revealed.

The private key corresponding to the public key in the certificate is accidentally revealed.

6) When Alice initiates communication with the website foo.com, foo.com sends Alice the site's certificate. Which of the following statements is true about this certificate?

The certificate includes foo.com’s public key, signed by the CA’s private key.

The certificate includes foo.com’s private key, signed by the CA's public key.

The certificate includes foo.com’s public key, signed by Alice’s private key.

The certificate includes foo.com’s public key, signed by foo.com’s private key.

7) When attempting to obtain a certificate from a CA (such as Let's Encrypt), one needs to prove ownership of the given domain. Which of the following are challenge options that can be used to prove one controls a domain? (Choose Two)

The server owner provides an email address from the domain to the CA. The CA verifies email ownership by sending a text code to that email and requesting the server owner supply it back to them.

The server owner adds a specific TXT record to the DNS records for the domain, as specified by the CA, which is then verified by the CA through a DNS lookup

The server owner places a challenge token on the web server, as specified by the CA, which the CA then tries to access via HTTP

The server owner provides a message to the CA signed with their private key, which the CA then verifies with the server owner's public key

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Transaction Processing
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education