Chapter 4 Reading Questions

advertisement
Reading Assignment
Due date: April 4, 2008
Student Name: ___________________________
This assignment will count as a quiz
Chapter 9 can help in answering the questions
1. In e-mail operation, what is the sequence that messages go through from the sender to the receiver?
a)
b)
c)
d)
Sender’s computer, Receiver’s mail server, Receiver’s computer
Sender’s computer, Sender’s mail server, Receiver’s computer
Sender’s computer, Sender’s mail server, Receiver’s mail server, receiver’s computer
None of the above
2. You want to connect to a mail server and download emails that were sent to you by your friends.
Which of the following protocols would be used for communication with the mail server? (Circle
all correct answers)
a) Simple Mail Transport Protocol
b) Extended transfer Protocol
c) Post Office Protocol
d) Internet Message Access Protocol
3. Typically, on what computers are e-mail shredding tools installed?
a)
b)
c)
d)
On receivers’ computers
On e-mail servers
Both a and b
Neither a nor b
4. Which of the following can be done with email shredding tools?
a) Actually delete email messages that are on the receiver’s computer
b) Make messages unreadable by receivers
c) All of the above
5. Which of the following is true about using the PGP cryptographic system for e-mail encryption?
a) Users can only use it for encryption/decryption if it is built into their email client programs.
b) Even if PGP is not built into their email client programs, users can still use PGP as
separate program to handle secure communication
c) It is an open source standard that is widely built into client email programs
d) Both a and b
e) None of the above
116104859
Page 1 of 2
6. As we saw in a previous lesson, X.509 is a public-key cryptographic system that uses a hierarchical
approach based on certificate authority. Which of the following is true about X.509 and PGP
a) Both X.509 and PGP use digital signature and public-key encryption.
b) With X.509, the sender public key is obtained from a trusted third party
c) With PGP, the sender’s public key could be obtained without referring to a third party
d) All of the above
e) None of the above
7. Suppose that you are using PGP for secure email communication with a couple of your friends. In
the web of trust (also known as circle of trust) you have set on your PGP configuration, there is
John, Paul, and Jessica. In that web trust infrastructure, there is a two-way trust relationship
between Jessica and one of her friend Mary. Which of the following is true?
a) You can have a secure communication with Jessica but not with Mary
b) You can have a secure communication with both Jessica and Mary
c) None of the above
8. Your company has decided to use S/MIME to secure email communication. Your advice is needed
to proceed with the implementation of the S/MIME-based secure email communication. Which of
the following will be among your list of advice?
a) A good web trust infrastructure (or circles of trust) must be implemented
b) A public key infrastructure needs to be implemented for public key authentication
through certificate authorities
c) None of the above
9. Which of the following is true about the difference between X.509, PGP and S/MIME? (Circle all
correct answers)
a) Unlike S/MIME, X.509 require a public key infrastructure
b) Like S/MIME, X.509 require a public key infrastructure
c) Unlike S/MIME, PGP could be used without a public key infrastructure
d) None of the above
10.You and a couple of friends have decided to use secure email communication. Which of the
following is the most likely option that you could use for your person-to person communication?
a) X.509
b) PGP
c) S/MIME
d) TLS
116104859
Page 2 of 2
Download