PrepAway - Latest Free Exam Questions & Answers

Receivers then authenticate senders’ public keys, by matching the CA public keys to the CA private keys

The following steps correctly list the actions taken by a Certificate Authority (CA)
1. Users send their public keys to a CA in a secure manner.
2. The CA signs the public keys with its own private keys, creating CA public keys.
3. The CA creates a certificate with its public and private keys.

Receivers then authenticate senders’ public keys, by matching the CA public keys to the CA
private keys on the certificates.

PrepAway - Latest Free Exam Questions & Answers

A.
True

B.
False

Explanation:

: You can verify this process in page 8.7 of the Checkpoint CCSE NG Courseware. The sender
need to send his/her public keys, they are signed with the private key of the CA (here is the
security), this creates a public key for the CA. With this key and the private ones, the CA creates a
certificate. This certificate can validate the sender’s public key against the receiver. See Page 8.7
of CCSE NG Official Courseware. (VPN1-FW1 Management II NG FP-1).


Leave a Reply