File Encryption
Public Key Infrastructure
Validation
Extended Validation
Certificate Concepts
100

This was introduced with NTFS version 3.

Encrypting File System (EFS)

100

The root CA has a this type certificate which is used to validate additional subordinate CAs.

Self-signed

100

This is the lowest level of validation.

Domain Validation

100

This X5.09 format certificates are the most common certificates in use. 

Privacy-Enhanced Email

100

This structure is known as certificate chaining or ___.

Chain of Trust

200

This is an encryption tool that encrypts emails, digitally signs emails, and encrypts documents.

GNU Privacy Guard (GPG)

200

This describes how digital certificates are constructed, including what information they will contain, their uses, and formatting.

X.509

200

This validation the purchaser needs to prove they are a domain administrator and also prove the organization is legitimate.

Organization Validation

200

This is a set of rules that defines how data must be encoded in a file. 

Distinguished Encoding Rules
200

This list contains a list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date and should no longer be trusted. 

Certificate Revocation List (CRL)

300

This is a commercial product that is now owned by Symantec and makes products that can be used to protect laptops, desktops, USB drives, optical media, and smartphones.

Pretty Good Privacy (PGP)

300

This allows an organization to cover multiple domains with one certificate. 

Subject Alternative Name (SAN)

300

This validation the purchaser needs to prove they are a domain administrator and the CA will also validate all information on the organization.

Extended Validation

300

This standard can contain only the intermediate certificate and root certificate, but not the private key.

Public Key Cryptography Standards #7 (PKCS #7)

300

This means that the server holding the certificate also provides revocation information. 

Online Certificate Status Protocol (OCSP) Stapling

400

This was introduced in Windows Vista and is used to encrypt an entire volume.

Bitlocker

400

This is similar to SAN certificates. But instead of covering multiple domains, the organization can cover one domain and multiple subdomains.

Wildcard Certificate

400

This validation process can take up to 3 days to issue certificate.

Organization

400

This standard holds certificate chains and the private key.

Public Key Cryptography Standards #12 (PKCS #12)

400

This has a server's certificate hard coded into it.

Certificate Pinning

500

These are the 4 places that you can store your Bitlocker key.

Personal Microsoft Account

USB flash drive

Print the key out

If the computer is on an Active Directory network, the recovery key can be saved in Active Directory

500

This certificate signing request includes the fully qualified domain name (FQDN) of the website. 

Common Name

500

This validation process can take up to 5 days to issue certificate.

Extended Validation

500

This is a group of standards published by RSA Security. 

Public Key Cryptography Standards (PKCS)

500

This is a common method of key archival. 

Key Escrow