paul78 wrote: » Minor clarification - a CA or Certificate Authority signs a certificate. Example - if I have a certificate that I want to use so that you can identify me. I would create a certificate signing request or CSR. The CSR is provided to a CA who will create a signature for that CSR and return back the certificate to me for use. If you trust the CA that I use, then whenever I present my certificate to you, the signature from the CA will let you know that it is my certificate because you trust the CA to have previously verified my certificate. Caveat - not sure if this level of detail is part of Security+.
jhntbright wrote: » Briefly: PKI is a collection of software, standardw and policies combined to enable users from the internet or other unsecured public networks to secure exchange data. PKI include as follow: 1. Certificate: a form of electronic credentials validates users, computers, devices on network. 2. Certificate authorities (CA): issure and manage certificates; they validate the identify of network device or user request data. 3. Certificate templates: used to costomize certificates issued by a certifcate server. 4. Certificate revocation list (CRL): a list of certificates that were revoked before they reached certificate expiration date.