Name:     ID: 
 
    Email: 

CNG 131 Chapter 05

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

Secure e-mail uses cryptography to secure messages transmitted across insecure networks.
 

 2. 

A hash function takes plaintext data of any length and creates a unique fixed-length output.
 

 3. 

A private key is used for encryption of data and is shared with others.
 

 4. 

Spam is the act of flooding the Internet with many copies of the same message in an attempt to force the message on people who otherwise would choose not to receive it.
 

 5. 

Data after it has been encrypted is called plaintext.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

Floods of unrequested junk mail are referred to as:
a.
plaintext
c.
twofish
b.
spam
d.
cryptography
 

 7. 

The result of the hash function is called the:
a.
message digest
c.
digital certificate
b.
passphrase
d.
digital signature
 
 
131test_files/i0100000.jpg
 

 8. 

In the figure above, which type of digital certificate standard is shown?
a.
PGP
c.
X.509
b.
MIME
d.
hybrid
 

 9. 

What type of encryption is very fast but uses symmetrical keys for encryption and decryption?
a.
hybrid
c.
PGP
b.
conventional
d.
S/MIME
 

 10. 

What does 3DES stand for?
a.
Triple Data Encryption Standard
c.
Triple Data Encryption System
b.
Triple Digital Encryption Standard
d.
Total Data Encryption Standardization
 

 11. 

What does CAST stand for?
a.
Computer Automated Security Testing
c.
Cipher Action System Technology
b.
Carlisle Adams and Stafford Tavares
d.
Computer Algorithm School Tripwire
 

 12. 

The recipient of an e-mail message knows for a fact that the message was sent by the person appearing in the message's TO: field, and that the details of the message body were received as they were written is called:
a.
confidentiality
c.
authentication
b.
integrity
d.
nonrepudiation
 

 13. 

When the sender and the recipient can transmit data to each other, over an unsecured or monitored link by encrypting messages, without worrying that their communications are monitors is called:
a.
confidentiality
c.
authentication
b.
integrity
d.
nonrepudiation
 

 14. 

Because secure e-mail uses secret encryption keys that only the owners know and have access to, the recipient of the e-mail knows for a fact that is was sent by the person it purports to be from, this feature is called:
a.
confidentiality
c.
authentication
b.
integrity
d.
nonrepudiation
 

 15. 

What is designed to answer the question of who an e-mail address and public key really belong to?
a.
digital certificates
c.
PGP
b.
digital signatures
d.
All of the above
 

 16. 

What uses a combination of conventional encryption and public key encryption?
a.
PGP
c.
S/MIME
b.
MIME
d.
Both A and C
 

 17. 

What does PKCS stand for?
a.
Public Key Cryptography Standards
c.
Public Key Computer Specifications
b.
Personal Key Cryptography Standards
d.
None of the above
 

 18. 

Hoaxes try to get users to pass the hoax along using which method below:
a.
generate excitement about being involved
c.
create a sense of importance
b.
play on people's greed
d.
All of the above
 

 19. 

What is the current defacto e-mail encryption standard among security professionals?
a.
MIME
c.
PGP
b.
S/MIME
d.
DSA
 

 20. 

PGP stands for:
a.
pretty good protection
c.
pretty good practices
b.
pretty good privacy
d.
None of the above
 
 
131test_files/i0240000.jpg
 

 21. 

What does the figure above illustrate?
a.
private key encryption
c.
secret key encryption
b.
public key encryption
d.
All of the above
 

 22. 

Which certificate standard does S/MIME rely on?
a.
X.509
c.
self-certification
b.
Open PGP
d.
3DES
 

 23. 

E-mails that area read and forwarded yet cause lost productivity due to their lack of significant content are called:
a.
viruses
c.
Trojan horses
b.
chain letters
d.
All of the above
 
 
131test_files/i0280000.jpg
 

 24. 

What does the figure above illustrate?
a.
antivirus program update
c.
single hoax in an endless loop
b.
user deleting contaminated e-mail
d.
real cost of chain letters and hoaxes
 

 25. 

What does MD5 stand for?
a.
Message Destruction version 5
c.
Media Display version 5
b.
Message Digest Algorithm 5
d.
Media Digest Algorithm 5
 

 26. 

What has become the mission-critical business application over the past decade?
a.
Internet usage
c.
e-business
b.
electronic mail
d.
All of the above
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
public key
e.
PGP
b.
private key
f.
S/MIME
c.
e-mail
g.
chain letter
d.
spam
h.
hoaxes
 

 27. 

Defines its own standards for digital certificates.
 

 28. 

Used for decryption and is kept secret.
 

 29. 

Specification for secure electronic mail.
 

 30. 

Flooding the Internet with the same message.
 

 31. 

E-mail reader spreads them.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
plaintext
e.
integrity
b.
spam
f.
confidentiality
c.
Phil Zimmerman
g.
Carlisle Adams
d.
hash
h.
PGP
 

 32. 

Communicating parties can be user data has not been modified.
 

 33. 

PGP encryption Standard.
 

 34. 

Function that creates a unique fixed-length output.
 

 35. 

Lacks encryption.
 

 36. 

Single certificate; multiple signatures possible.
 



 
Submit          Reset Help