True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
Secure e-mail uses cryptography to secure messages transmitted across insecure
networks.
|
|
2.
|
A
hash function takes plaintext data of any length and creates a unique fixed-length
output.
|
|
3.
|
A
private key is used for encryption of data and is shared with others.
|
|
4.
|
Spam
is the act of flooding the Internet with many copies of the same message in an attempt to force the
message on people who otherwise would choose not to receive it.
|
|
5.
|
Data
after it has been encrypted is called plaintext.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
Floods of unrequested junk mail are referred to as: a. | plaintext | c. | twofish | b. | spam | d. | cryptography | | | | |
|
|
7.
|
The
result of the hash function is called the: a. | message digest | c. | digital certificate | b. | passphrase | d. | digital
signature | | | | |
|
|
|
|
|
8.
|
In
the figure above, which type of digital certificate standard is shown? a. | PGP | c. | X.509 | b. | MIME | d. | hybrid | | | | |
|
|
9.
|
What
type of encryption is very fast but uses symmetrical keys for encryption and
decryption? a. | hybrid | c. | PGP | b. | conventional | d. | S/MIME | | | | |
|
|
10.
|
What
does 3DES stand for? a. | Triple Data Encryption Standard | c. | Triple Data Encryption System | b. | Triple Digital
Encryption Standard | d. | Total Data
Encryption Standardization | | | | |
|
|
11.
|
What
does CAST stand for? a. | Computer Automated Security
Testing | c. | Cipher Action
System Technology | b. | Carlisle Adams and Stafford
Tavares | d. | Computer
Algorithm School Tripwire | | | | |
|
|
12.
|
The
recipient of an e-mail message knows for a fact that the message was sent by the person appearing in
the message's TO: field, and that the details of the message body were received as they were written
is called: a. | confidentiality | c. | authentication | b. | integrity | d. | nonrepudiation | | | | |
|
|
13.
|
When
the sender and the recipient can transmit data to each other, over an unsecured or monitored link by
encrypting messages, without worrying that their communications are monitors is
called: a. | confidentiality | c. | authentication | b. | integrity | d. | nonrepudiation | | | | |
|
|
14.
|
Because secure e-mail uses secret encryption keys that only the owners know and have
access to, the recipient of the e-mail knows for a fact that is was sent by the person it purports to
be from, this feature is called: a. | confidentiality | c. | authentication | b. | integrity | d. | nonrepudiation | | | | |
|
|
15.
|
What
is designed to answer the question of who an e-mail address and public key really belong
to? a. | digital
certificates | c. | PGP | b. | digital signatures | d. | All of the above | | | | |
|
|
16.
|
What
uses a combination of conventional encryption and public key encryption? a. | PGP | c. | S/MIME | b. | MIME | d. | Both A and C | | | | |
|
|
17.
|
What
does PKCS stand for? a. | Public Key Cryptography
Standards | c. | Public Key
Computer Specifications | b. | Personal Key Cryptography
Standards | d. | None of the
above | | | | |
|
|
18.
|
Hoaxes try to get users to pass the hoax along using which method
below: a. | generate
excitement about being involved | c. | create a sense
of importance | b. | play on people's greed | d. | All of the above | | | | |
|
|
19.
|
What
is the current defacto e-mail encryption standard among security professionals?
|
|
20.
|
PGP
stands for: a. | pretty good
protection | c. | pretty good
practices | b. | pretty good privacy | d. | None of the above | | | | |
|
|
|
|
|
21.
|
What
does the figure above illustrate? a. | private key encryption | c. | secret key encryption | b. | public key
encryption | d. | All of the
above | | | | |
|
|
22.
|
Which
certificate standard does S/MIME rely on? a. | X.509 | c. | self-certification | b. | Open
PGP | d. | 3DES | | | | |
|
|
23.
|
E-mails that area read and forwarded yet cause lost productivity due to their lack of
significant content are called: a. | viruses | c. | Trojan horses | b. | chain
letters | d. | All of the
above | | | | |
|
|
|
|
|
24.
|
What
does the figure above illustrate? a. | antivirus program update | c. | single hoax in an endless loop | b. | user deleting
contaminated e-mail | d. | real cost of
chain letters and hoaxes | | | | |
|
|
25.
|
What
does MD5 stand for? a. | Message Destruction version 5 | c. | Media Display version 5 | b. | Message Digest
Algorithm 5 | d. | Media Digest
Algorithm 5 | | | | |
|
|
26.
|
What
has become the mission-critical business application over the past decade? a. | Internet
usage | c. | e-business | b. | electronic mail | d. | All of the above | | | | |
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | public
key | e. | PGP | b. | private key | f. | S/MIME | c. | e-mail | g. | chain
letter | d. | spam | h. | hoaxes | | | | |
|
|
27.
|
Defines its own standards for digital certificates.
|
|
28.
|
Used
for decryption and is kept secret.
|
|
29.
|
Specification for secure electronic mail.
|
|
30.
|
Flooding the Internet with the same message.
|
|
31.
|
E-mail reader spreads them.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | plaintext | e. | integrity | b. | spam | f. | confidentiality | c. | Phil
Zimmerman | g. | Carlisle
Adams | d. | hash | h. | PGP | | | | |
|
|
32.
|
Communicating parties can be user data has not been modified.
|
|
33.
|
PGP
encryption Standard.
|
|
34.
|
Function that creates a unique fixed-length output.
|
|
35.
|
Lacks
encryption.
|
|
36.
|
Single certificate; multiple signatures possible.
|