Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.
Answer:
1. SSH/Telnet.
2. SMTP.
3. DNS.
4. DHCP.
5. HTTPS/SSL.
6. FTP
Explanation:
1. Provides connections to computers over a TCP/IP network: the standard protocol used for this is SSH/Telnet, through port number 22 and 23 respectively.
SSH is acronym for secure shell.
2. Sends e-mail over a TCP/IP network: SMTP using port number 25.
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
3. Translates URLs to IP address: DNS using port number 53.
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
4. Automates assignment of IP address on a network: DHCP using port number 67.
Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.
5. Securely transports web pages over a TCP/IP network: HTTPS/SSL using port number 443.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
6. Transports files over a TCP/IP network: FTP using port number 20 or 21.
FTP is an acronym for file transfer protocol.
Answer:
B) False
Explanation:
You can adjust the boxes to whatever you'd like, and even add more if you needed too.