Reading Assignment Due date: April 4, 2008 Student Name: ___________________________ This assignment will count as a quiz Chapter 9 can help in answering the questions 1. In e-mail operation, what is the sequence that messages go through from the sender to the receiver? a) b) c) d) Sender’s computer, Receiver’s mail server, Receiver’s computer Sender’s computer, Sender’s mail server, Receiver’s computer Sender’s computer, Sender’s mail server, Receiver’s mail server, receiver’s computer None of the above 2. You want to connect to a mail server and download emails that were sent to you by your friends. Which of the following protocols would be used for communication with the mail server? (Circle all correct answers) a) Simple Mail Transport Protocol b) Extended transfer Protocol c) Post Office Protocol d) Internet Message Access Protocol 3. Typically, on what computers are e-mail shredding tools installed? a) b) c) d) On receivers’ computers On e-mail servers Both a and b Neither a nor b 4. Which of the following can be done with email shredding tools? a) Actually delete email messages that are on the receiver’s computer b) Make messages unreadable by receivers c) All of the above 5. Which of the following is true about using the PGP cryptographic system for e-mail encryption? a) Users can only use it for encryption/decryption if it is built into their email client programs. b) Even if PGP is not built into their email client programs, users can still use PGP as separate program to handle secure communication c) It is an open source standard that is widely built into client email programs d) Both a and b e) None of the above 116104859 Page 1 of 2 6. As we saw in a previous lesson, X.509 is a public-key cryptographic system that uses a hierarchical approach based on certificate authority. Which of the following is true about X.509 and PGP a) Both X.509 and PGP use digital signature and public-key encryption. b) With X.509, the sender public key is obtained from a trusted third party c) With PGP, the sender’s public key could be obtained without referring to a third party d) All of the above e) None of the above 7. Suppose that you are using PGP for secure email communication with a couple of your friends. In the web of trust (also known as circle of trust) you have set on your PGP configuration, there is John, Paul, and Jessica. In that web trust infrastructure, there is a two-way trust relationship between Jessica and one of her friend Mary. Which of the following is true? a) You can have a secure communication with Jessica but not with Mary b) You can have a secure communication with both Jessica and Mary c) None of the above 8. Your company has decided to use S/MIME to secure email communication. Your advice is needed to proceed with the implementation of the S/MIME-based secure email communication. Which of the following will be among your list of advice? a) A good web trust infrastructure (or circles of trust) must be implemented b) A public key infrastructure needs to be implemented for public key authentication through certificate authorities c) None of the above 9. Which of the following is true about the difference between X.509, PGP and S/MIME? (Circle all correct answers) a) Unlike S/MIME, X.509 require a public key infrastructure b) Like S/MIME, X.509 require a public key infrastructure c) Unlike S/MIME, PGP could be used without a public key infrastructure d) None of the above 10.You and a couple of friends have decided to use secure email communication. Which of the following is the most likely option that you could use for your person-to person communication? a) X.509 b) PGP c) S/MIME d) TLS 116104859 Page 2 of 2