click below
click below
Normal Size Small Size show me how
CIT226 Ch9 IIS Cert
Question | Answer |
---|---|
asymmetric encryption | A form of encryption in which there are two keys, one used to encrypt the data and the other to decrypt it. |
CA administrator role | A CA (certificate authority) management role given to the user account or security group that manages the general functions of a CA server, such as starting and stopping it. |
certificate authority (CA) | A network entity or host, such as a server, that issues digital certificates of trust verifying the legitimacy of the certificate holders. |
certificate manager role | A CA (certificate authority) management role given to the user account or security group that handles enrollment and revocation of digital certificates. See certificate authority. |
certificate revocation list (CRL) | A list of certificates that have been revoked that is used by a PKI to block access to the clients on the list. See public key infrastructure (PKI). |
credential roaming | An AD Certificate Services capability that enables digital certificate credentials to follow a user to different computers in a domain when that user logs on using her or his regular account. |
delta CRL | A certificate revocation list (CRL) that contains information on only the digital certificates revoked after the last full CRL was issued. See certificate revocation list. |
digital certificate | A set of unique identification information that is typically put at the end of a file, or that is associated with a computer communication. Its purpose is to show that the source of the file or communication is legitimate. |
File Transfer Protocol (FTP) | Available through the TCP/IP protocol suite, FTP enables files to be transferred across a network or the Internet between computers or servers. |
Internet Information Services (IIS) | A Microsoft Windows Server 2008 role that provides Internet Web, FTP, mail, and other services, and that is particularly offered to set up a Web server. |
Internet Server Application Programming Interface (ISAPI) | A group of dynamic link library (DLL) files that consist of applications and filters to enable user-customized programs to interface with IIS and to trigger particular programs, such as a specialized security check or a database lookup. |
Online Certificate Status Protocol (OCSP) | A protocol used to determine if a digital certificate is revoked. This protocol is used for digital certificates that are in the X.509 format. |
Open Database Connectivity (ODBC) | A set of database access rules used by Microsoft in its ODBC application programming interface for accessing databases and providing a standard doorway to database data. |
public key | An encryption method that uses a public key and a private key combination. The public key can be communicated over an unsecured connection. Public key uses asymmetric encryption. See asymmetric encryption. |
public key infrastructure (PKI) | Creating a network infrastructure by linking a public key to each user or network entity to verify that user or entity is trusted. See public key. |
Simple Certificate Enrollment Protocol (SCEP) | A standard protocol developed to simplify the process of a network device, such as a router or switch, requesting a digital certificate. SCEP uses X.509 digital certificates and was initially developed through the efforts of VeriSign and Cisco |
Simple Mail Transfer Protocol (SMTP) | An e-mail protocol used by systems having TCP/IP network communications. |
Uniform Resource Locator (URL) | An addressing format used to find an Internet Web site or page. |
virtual directory | A URL-formatted address that provides an Internet location (virtual location) for an actual physical folder on a Web server that is used to publish Web documents. |
X.509 | A standard established by the International Organization for Standardization (ISO) for PKI and that sets a format for digital certificates. See public key infrastructure. |