Receivers then authenticate senders’ public keys, by matching the CA public keys to the CA private keys on the certificates.

The following steps correctly list the actions taken by a Certificate Authority (CA)
1. Users send their public keys to a CA in a secure manner.
2. The CA signs the public keys with its own private keys, creating CA public keys.
3. The CA creates a certificate with its public and private keys.

Receivers then authenticate senders’ public keys, by matching the CA public keys to the CA
private keys on the certificates.

The following steps correctly list the actions taken by a Certificate Authority (CA)
1. Users send their public keys to a CA in a secure manner.
2. The CA signs the public keys with its own private keys, creating CA public keys.
3. The CA creates a certificate with its public and private keys.

Receivers then authenticate senders’ public keys, by matching the CA public keys to the CA
private keys on the certificates.

A.
True

B.
False

Explanation:

: You can verify this process in page 8.7 of the Checkpoint CCSE NG Courseware. The sender
need to send his/her public keys, they are signed with the private key of the CA (here is the
security), this creates a public key for the CA. With this key and the private ones, the CA creates a
certificate. This certificate can validate the sender’s public key against the receiver. See Page 8.7
of CCSE NG Official Courseware. (VPN1-FW1 Management II NG FP-1).



Leave a Reply 0

Your email address will not be published. Required fields are marked *