070-417 Free Dumps Study Materials
Question 2: Your network contains an Active Directory domain named contoso.com. The domain contains
four servers. The
servers are configured as shown in the following table.
You plan to deploy an enterprise certification authority (CA) on a server named Servers. Server5 will
be used to issue
certificates to domain-joined computers and workgroup computers.
You need to identify which server you must use as the certificate revocation list (CRL) distribution
point for Server5.
Which server should you identify?
A. Server1
B. Server3
C. Server4
D. Server2
Correct Answer: B
Explanation:
CDP (and AD CS) always uses a Web Server
NB: this CDP must be accessible from outside the AD, but here we don't have to wonder about that
as there's only one
web server.
http://technet.microsoft.com/fr-fr/library/cc782183%28v=ws.10%29.aspx
Selecting a CRL Distribution Point
Because CRLs are valid only for a limited time, PKI clients need to retrieve a new CRL periodically.
Windows
Server 2003 PKI Applications look in the CRL distribution point extension for a URL that points to a
network location
from which the CRL object can be retrieved. Because CRLs for enterprise CAs are stored in Active
Directory, they can
be accessed by means of LDAP. In comparison, because CRLs for stand-alone CAs are stored in a
directory on the
server, they can be accessed by means of HTTP, FTP, and so on as long as the CA is online. Therefore,
you should set
the CRL distribution point after the CA has been installed.
The system account writes the CRL to its distribution point, whether the CRL is published manually or
is published
according to an established schedule. Therefore you must ensure that the system accounts for CAs
have permission to
write to the CRL distribution point. Because the CRL path is also included in every certificate, you
must define the CRL
location and its access path before deploying certificates. If an Application performs revocation
checking and a valid
CRL is not available on the local computer, it rejects the certificate.
You can modify the CRL distribution point by using the Certification Authority MMC snap-in. In this
way, you can
change the location where the CRL is published to meet the needs of users in your organization. You
must move the
CRL distribution point from the CA configuration folder to a Web server to change the location of the
CRL, and you
must move each new CRL to the new distribution point, or else the chain will break when the
previous CRL expires.
Note
On root CAs, you must also modify the CRL distribution point in the CAPolicy.inf file so that the root
CA certificate
references the correct CDP and AIA paths, if specified. If you are using certificates on the Internet,
you must have at
least one HTTPs-accessible location for all certificates that are not limited to internal use.
http://technet.microsoft.com/en-us/library/cc771079.aspx
Configuring Certificate Revocation
It is not always possible to contact a CA or other trusted server for information about the validity of a
certificate. To
effectively support certificate status checking, a client must be able to access revocation data to
determine whether
the certificate is valid or has been revoked. To support a variety of scenarios, Active Directory
Certificate Services (AD
CS) supports industry-standard methods of certificate revocation. These include publication of
certificate revocation
lists (CRLs) and delta CRLs, which can be made available to clients from a variety of locations,
including Active
Directory Domain Services (AD DS), Web servers, and network file shares.