1. A certificate authority associates a specific _____ with the entity requesting the certificate. (a) private key (b) public key (c) digital signature (d) password Correct answer is (b) Your score on this question is: 8.33 Feedback: See section 6.2.3, subsection "Digital Certificates and Certificate Authorities," in the course notes. 2. Which of the following comparisons between public-key encryption schemes and private-key encryption schemes is true? (a) It is easier to decrypt data using private-key encryption schemes than public-key encryption schemes. (b) Public-key encryption schemes involve more computations than private-key encryption schemes. (c) It takes longer to transmit encrypted data using private-key encryption schemes than public-key encryption schemes. (d) Private-key encryption schemes are more secure than public-key encryption schemes. Correct answer is (b) Your score on this question is: 8.33 Feedback: See section 6.2.1, subsection "Hybrid Encryption Schemes," in the course notes. 3. With respect to security on the Internet, what is the purpose of digital signatures? (a) To verify the identity of a message sender (b) To request receipts for all sent messages (c) To post anonymous messages to bulletin boards (d) To encrypt mail messages Correct answer is (a) Your score on this question is: 8.33 Feedback: See section 6.2.3 of the course notes. 4. Which of the following is (are) true about encryption of data? I. Given the high speed and low cost CPUs available, even the most complex encrypted data is not entirely safe for a long period of time. II. The more bits in the key of the encryption algorithm, the harder it is to break the encryption. III. In public key encryption, the sender and the receiver of encrypted data both use the same key value to encrypt and decrypt the data. (a) I and III only (b) I, II, and III (c) II and III only (d) I and II only Correct answer is (d) Your score on this question is: 8.33 Feedback: See section 6.2.1 of the course notes. 5. Encryption is used to (a) store data files in a vault (b) protect privacy by encoding data (c) archive system files (d) save storage space Correct answer is (b) Your score on this question is: 8.33 Feedback: See section 6.2.1 of the course notes. 6. How does a receiver of an encrypted message verify that the message originated from the sender? (a) The receiver compares the message hashed with the decrypted signature of the sender. (b) The receiver compares the received message with the sender's signature. (c) The receiver compares the message with the decrypted signature of the sender. (d) The receiver compares the message hashed with the sender's signature. Correct answer is (a) Your score on this question is: 8.33 Feedback: See section 6.2.3, subsection "Digital Signatures," in the course notes. 7. Which of the following reasons is (are) valid for why "iCarnegie" is a bad password? I. II. III. It is a word from the dictionary. It does not contain numbers and symbols. It is the name of an institution. (a) I and II only (b) I and III only (c) II and III (d) I, II, and III Correct answer is (c) Your score on this question is: 8.33 Feedback: See section 6.2.3, subsection "Strong Passwords," in the course notes. 8. To encrypt a message using public-key encryption scheme, which of the following must be done? (a) Encrypt the message using the sender's public key. (b) Encrypt the message using the receiver's public key. (c) Encrypt the message using the receiver's private key. (d) Encrypt the message using the sender's private key. Correct answer is (b) Your score on this question is: 0.00 Feedback: See section 6.2.1, subsection "Public Key Encryption Scheme," in the course notes. 9. Which of the following is true about private-key encryption schemes? (a) The sender and the receiver have two private keys, one for encryption and one for decryption. (b) The sender and the receiver use the same private key. (c) The sender and the receiver have different private keys. (d) The sender must notify the receiver before sending a message. Correct answer is (b) Your score on this question is: 8.33 Feedback: See section 6.2.1, subsection "Private Key Encryption Scheme," in the course notes. 10. Which of the following is correct with respect to customers providing highly personal information across the Internet through electronic commerce transactions? (a) It is impossible for anybody to see the transaction on the Internet except for the intended Web site conducting the transaction. (b) Transactions are relatively secure between the consumer and a company's Web site if the data is encrypted. (c) Customers should never provide charge card information when asked to complete an electronic commerce transaction. (d) If a transaction is encrypted, any unauthorized parties intercepting the transaction will take ten or more years to decrypt the information. Correct answer is (b) Your score on this question is: 8.33 Feedback: See section 6.2 of the course notes. 11. One of the most common applications of encryption is transmitting data securely over the Web via (a) e-mail (b) the Secure Socket Layer (SSL) (c) a simple substitution code (d) a Trojan horse Correct answer is (b) Your score on this question is: 8.33 Feedback: See section 6.2.3 of the course notes. 12. With respect to public key encryption, which of the following is true of a server's public key when transferring data across the Internet to a client computer? (a) It is not a very secure method of encryption, because every computer is aware of a recipient's public key value and can decrypt the data. (b) All clients and servers use the same public key when transferring encrypted data on the Internet. (c) It is used by the server to decrypt information sent by a client. (d) It is used by client computers when transferring encrypted data from that particular server. Correct answer is (d) Your score on this question is: 0.00 Feedback: See section 6.2.1 of the course notes.