Chapter 8 Review Questions

Chapter 8 Review Questions - Chapter 8 Review Questions...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8 Review Questions Review of attempt 1 Started on Wednesday, July 13, 2011, 07:44 PM Completed on Wednesday, July 13, 2011, 08:40 PM Time taken 55 mins 19 secs Grade 92 out of a maximum of 100 ( 92 %) Question 1 Marks: 2 ____ are encrypted messages that can be mathematically proven to be authentic. Choose one answer. a. Digital signatures b. MAC c. Message certificates d. Message digests Correct Marks for this submission: 2/2. Question 2 Marks: 2 A(n) distinguished name uniquely identifies a certificate entity, to a user’s public key. Answer: True False
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Incorrect Marks for this submission: 0/2. Question 3 Marks: 2 Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. Answer: True False Correct Marks for this submission: 2/2. Question 4 Marks: 2 As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. Answer: True False Correct Marks for this submission: 2/2. Question 5 Marks: 2 A(n) ____________________ substitution uses one alphabet. Answer: Correct Marks for this submission: 2/2. Question 6 Marks: 2 An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, and thus reverse-engineer the encryption algorithm in a known-plaintext attack scheme. Answer: True False Correct Marks for this submission: 2/2.
Background image of page 2
Question 7 Marks: 2 In IPSEC ____________________ mode, only the IP data is encrypted, not the IP headers. Answer: Correct Marks for this submission: 2/2. Question 8 Marks: 2 Digital ____________________ are public-key container files that allow computer programs to validate the key and identify to whom it belongs. Answer: Correct Marks for this submission: 2/2. Question 9 Marks: 2 Digital ____________________ are encrypted messages that can be mathematically proven to be authentic. Answer: Correct Marks for this submission: 2/2. Question 10 Marks: 2 A message ____________________ is a fingerprint of the author’s message that is compared with the recipient’s locally calculated hash of the same message. Answer: Correct Marks for this submission: 2/2. Question 11 Marks: 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Digital signatures should be created using processes and products that are based on the ____. Choose one answer. a. DSS b. NIST c. SSL d. HTTPS Incorrect Marks for this submission: 0/2. Question 12 Marks: 2 DES uses a(n) _____-bit block size. Choose one answer. a. 32 b. 64 c. 128 d. 256 Correct Marks for this submission: 2/2. Question 13 Marks: 2 Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

Chapter 8 Review Questions - Chapter 8 Review Questions...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online