PrepAway - Latest Free Exam Questions & Answers

Which of the following technologies can provide protection for the PKI’s escrowed keys?

The key management organization has implemented a key escrowing function. Which of the
following technologies can provide protection for the PKI’s escrowed keys?

PrepAway - Latest Free Exam Questions & Answers

A.
CRL

B.
OCSP

C.
TPM

D.
HSM

2 Comments on “Which of the following technologies can provide protection for the PKI’s escrowed keys?

  1. Lake says:

    A CRL is a database of revoked keys and signatures. CRL (Certificate Revocation List) was first released to allow the CA to revoke certificates, however due to limitations with this method it was succeeded by OSCP (Online Certificate Status Protocol).

    The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.

    Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It can be used to assist with hash key generation. TPM is the name assigned to a chip that can store cryptographic keys, passwords, or certificates. TPM can be used to protect smart phones and devices other than PCs as well. It can also be used to generate values used with whole disk encryption such as BitLocker.

    Hardware Security Module (HSM) hardware-based encryption solution that is usually used in conjunction with PKI to enhance security with certification authorities (CAs). It is available as an expansion card and can cryptographic keys, passwords, or certificates. However, the HSM secures communication between devices rather than the data on the device.

    The correct answer is D.




    2



    0

Leave a Reply