True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
When
data is encrypted, it becomes an unreadable series of symbols and numbers called
ciphertext.
|
|
2.
|
Modern cryptography uses algorithms to encrypts and decrypt data.
|
|
3.
|
Stream algorithms operate on the plaintext one bit at a time.
|
|
4.
|
Cryptography allows users to transmit sensitive information over unsecured networks
and can be either strong or weak.
|
|
5.
|
Using
nonrepudiation, a data sender can disavow that he or she did or did not send a certain piece of
information.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
A
credential that allows a recipient to verify whether a public key belongs to its owner is called
a(n): a. | keyring | c. | direct
trust | b. | digital certificate | d. | key escrow | | | | |
|
|
7.
|
A
complex mathematical function that is used extensively in cryptography is called
a(n): a. | ciphertext | c. | introducer | b. | plaintext | d. | algorithm | | | | |
|
|
8.
|
What
is an example of a unique identifier on a certificate? a. | fingerprint | c. | keyring | b. | hashing | d. | direct trust | | | | |
|
|
9.
|
A
database that allows users to submit and retrieve digital certificates is called
a(n): a. | distinguished
name | c. | certificate
server | b. | block algorithm | d. | None of the above | | | | |
|
|
10.
|
A
trust model where the user trusts a key because the user knows where it came from is called
a(n): a. | direct
trust | c. | limited
trust | b. | hierarchical trust | d. | All of the above | | | | |
|
|
11.
|
What
is a list of trusted certificates called? a. | nonrepudiation | c. | keyring | b. | ciphertext | d. | plaintext | | | | |
|
|
12.
|
What
is data called that can be read without any manipulation? a. | ciphertext | c. | readable
text | b. | encrypted
text | d. | plaintext | | | | |
|
|
13.
|
What
are other users on a system who sign the keys of friends to verify their validity? a. | introducers | c. | certificate
server | b. | fingerprint | d. | None of the above | | | | |
|
|
14.
|
What
is plaintext called that has been encrypted and is in an unreadable series of symbols and
numbers? a. | nonrepudiation | c. | coded
text | b. | block
algorithms | d. | ciphertext | | | | |
|
|
15.
|
What
is the published document called that explains to all users how the CA is
structured? a. | certificate
revocation list | c. | certificate
policy | b. | certificate practice statement | d. | certificate server | | | | |
|
|
16.
|
An
algorithm that encrypts and decrypts data in groups of bits is called a(n): a. | block
algorithm | c. | stream
algorithm | b. | asymmetric algorithm | d. | symmetric algorithm | | | | |
|
|
17.
|
What
is another name for a public key algorithm, a method that uses different encryption and decryption
keys? a. | block
algorithm | c. | stream
algorithm | b. | asymmetric algorithm | d. | symmetric algorithm | | | | |
|
|
18.
|
A
unique identifier that is bound to a certificate by a certificate authority is called
a(n): a. | certification
authority | c. | key
escrow | b. | digital signature | d. | distinguished name | | | | |
|
|
19.
|
An
algorithm where the encryption key can be calculated from the decryption key and vice versa is called
a(n): a. | block
algorithm | c. | stream
algorithm | b. | asymmetric algorithm | d. | symmetric algorithm | | | | |
|
|
20.
|
What
is the trust model called that combines the concepts of direct trust and hierarchical
trust? a. | web of
trust | c. | direct
trust | b. | certificate policy | d. | None of the above | | | | |
|
|
21.
|
A
trusted person or group responsible for issuing certificates to authorized users on a system is
called a(n): a. | certificate
revocation list | c. | certificate
practice statement | b. | certification authority | d. | All of the above | | | | |
|
|
22.
|
What
is a key administration process that utilizes a third party called? a. | keyring | c. | nonrepudiation | b. | hashing | d. | key escrow | | | | |
|
|
23.
|
What
is a benefit of cryptography where the sender of the data cannot disavow that they did or didn't send
the information? a. | nonrepudiation | c. | direct
trust | b. | ciphertext | d. | certificate policy | | | | |
|
|
24.
|
What
establishes who may serve as a CA, what types of certificates may be issued, and how the CA is
structured? a. | certificate
server | c. | digital
certificates | b. | certificate policy | d. | digital signatures | | | | |
|
|
25.
|
What
does OCSP stand for? a. | Online Certificate Status
Protocol | c. | Only Certificate
Status Protocol | b. | Online Certificate Server
Protocol | d. | None of the
above | | | | |
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | hierarchical
trust | e. | certificate
server | b. | direct trust | f. | certificate authority | c. | encryption | g. | keyring | d. | algorithm | h. | plaintext | | | | |
|
|
26.
|
Method of disguising plaintext to hide its substance.
|
|
27.
|
Data
that can be read without any manipulation.
|
|
28.
|
Database that allows users to submit and retrieve digital certificates.
|
|
29.
|
Trust
model based on a number of root certificates.
|
|
30.
|
Complex mathematical function that is used extensively in cryptography.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | keyring | e. | block
algorithm | b. | symmetric algorithm | f. | validity | c. | stream
algorithm | g. | ciphertext | d. | hashing | h. | fingerprint | | | | |
|
|
31.
|
Establishes that a public key certificate does belong to its owner.
|
|
32.
|
Algorithm that converts plaintext one bit at a time.
|
|
33.
|
A
list of trusted certificates.
|
|
34.
|
A
unique identifier on a certificate.
|
|
35.
|
Algorithm that encrypts and decrypts data in groups of bits.
|