A Quick Answer Key follows the Self Test questions. For complete questions, answers, and explanations to the Self Test questions in this chapter as well as the other chapters in this book, see the Self Test Appendix.
1. | NoMoreHackers Inc. is implementing a PKI implementation. You have been asked to work as a consultant to design the PKI blueprint for the company. You have met with the CIO and the senior management to gather the requirements. You are confident of creating a sophisticated PKI architecture for the company. What will be your first step in the process?
| |
2. | IronCladSecurity Ltd s organization structure has several components . The majority of IT needs of the enterprise are met by the IronCladSecurity staff. This includes manufacturing, accounting, and sales divisions of the company. They also subcontract to other IT companies to provide IT services. The proposed PKI security structure should support all these business activities. What do you recommend to implement at IronCladSecurity under Windows Server 2003?
| |
3. | You are contemplating the hierarchy of the CA servers at IronCladSecurity. IronCladSecurity has 40 offices in the United States, Germany, and Singapore. They have both contractors and permanent employees working for them, and have multiple IT departments. However, there is no Active Directory implementation for the enterprise. IronCladSecurity prefers to have independent entries as subsidiaries. Therefore, they do not prefer to link the three IT systems to accommodate a global IT system. What trust hierarchies can IronCladSecurity support?
| |
4. | You are reviewing a previous PKI implementation of a company called NoMoreHackers. It has come to your attention that all of the CA servers are connected to the network. The root CA, intermediary, and issuing CAs are connected to the same domain. You believe this a severe security risk and have instructed the company to take the servers offline. What step will not assist you to make the CA servers offline?
| |
5. | You are proposing a new PKI implementation for NoMoreHackers to replace the existing security structure. You have proposed a three- tier CA server structure with online and offline CAs to protect the CAs from intruders. You will have root CA, policy CAs, and issuing CAs in your implementation. Which CAs will be set as offline CAs?
| |
Answers
1. | B |
2. | C |
3. | C |
4. | C |
5. | B |
6. | You are about to install a CA on Windows Server 2003. You have a choice of two machines. One is a single processor machine with 1GB of memory with an existing Windows Server 2003 on a FAT file system. The other system is a twin processor with 512MB of memory on an NTFS file system. Which one would you choose to host the CA?
| |
7. | We are going through the wizards to install a CA on a Windows Server 2003 server. We have selected the type as a stand-alone root CA. We have also selected the MS Strong Cryptographic Provider as the CSP. Now we need to select a hashing algorithm for the private and public key pair. What is a Windows 2003 hashing algorithm that comes with default CA installation?
| |
8. | Our management has asked us to install a CA to issue certificates to the employees and the business partners of our company. We are contemplating either Windows 2000 Server or Windows Server 2003 as our CA implementation. You have read that there are several new features in the Windows Server 2003 CA architecture that support a better implementation for the company. What are the new features?
| |
9. | You are been appointed as the new CA administrator of one of the subordinate CA servers. You will administer the CA through the MMC Certification Authority application. You are experimenting with the different functionalities of the CA console. What is not available to you modify in the CA MMC console?
| |
10. | Several of your company resources are behaving strangely. You have noticed that some of the printer queues were deleted using an administrator account. All of these printers are protected using the PKI certificates of the company. You suspect that someone has obtained the CA keys and is impersonating the administrator account to delete the print queue. How will you solve this puzzle?
| |
Answers
6. | D |
7. | D |
8. | D |
9. | D |
10. | A |