Which is a correct description of a Public Key Infrastructure (PKI)?
A.
A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.
B.
A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.
A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.
The Answer Is:
D
This question includes an explanation.
Explanation:
Public Key Infrastructure (PKI) relies on a trusted root Certification Authority (CA) to issue certificates. Devices and users must trust the root CA for the PKI to be effective. If a root CA certificate is not pre-installed or manually chosen to be trusted on a device, any certificates issued by that CA will not be inherently trusted by the device.
[Reference: The concept and structure of PKI are detailed in various security literature, such as NIST Special Publication 800-32 - Introduction to Public Key Technology and the Federal PKI Infrastructure., ]
HPE6-A78 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"