(2)

advertisement
1.
A certificate authority associates a specific _____ with the entity requesting the
certificate.
(a) private key
(b) public key
(c) digital signature
(d) password
Correct answer is (b)
Your score on this question is:
8.33
Feedback:
See section 6.2.3, subsection "Digital Certificates and Certificate
Authorities," in the course notes.
2.
Which of the following comparisons between public-key encryption schemes and
private-key encryption schemes is true?
(a) It is easier to decrypt data using private-key encryption schemes than
public-key encryption schemes.
(b) Public-key encryption schemes involve more computations than private-key
encryption schemes.
(c) It takes longer to transmit encrypted data using private-key encryption schemes
than public-key encryption schemes.
(d) Private-key encryption schemes are more secure than public-key encryption
schemes.
Correct answer is (b)
Your score on this question is:
8.33
Feedback:
See section 6.2.1, subsection "Hybrid Encryption Schemes," in the course
notes.
3.
With respect to security on the Internet, what is the purpose of digital signatures?
(a) To verify the identity of a message sender
(b) To request receipts for all sent messages
(c) To post anonymous messages to bulletin boards
(d) To encrypt mail messages
Correct answer is (a)
Your score on this question is:
8.33
Feedback:
See section 6.2.3 of the course notes.
4.
Which of the following is (are) true about encryption of data?
I.
Given the high speed and low cost CPUs available, even the most complex
encrypted data is not entirely safe for a long period of time.
II.
The more bits in the key of the encryption algorithm, the harder it is to break
the encryption.
III.
In public key encryption, the sender and the receiver of encrypted data both
use the same key value to encrypt and decrypt the data.
(a) I and III only
(b) I, II, and III
(c) II and III only
(d) I and II only
Correct answer is (d)
Your score on this question is:
8.33
Feedback:
See section 6.2.1 of the course notes.
5.
Encryption is used to
(a) store data files in a vault
(b) protect privacy by encoding data
(c) archive system files
(d) save storage space
Correct answer is (b)
Your score on this question is:
8.33
Feedback:
See section 6.2.1 of the course notes.
6.
How does a receiver of an encrypted message verify that the message originated
from the sender?
(a) The receiver compares the message hashed with the decrypted signature of the
sender.
(b) The receiver compares the received message with the sender's signature.
(c) The receiver compares the message with the decrypted signature of the sender.
(d) The receiver compares the message hashed with the sender's signature.
Correct answer is (a)
Your score on this question is:
8.33
Feedback:
See section 6.2.3, subsection "Digital Signatures," in the course notes.
7.
Which of the following reasons is (are) valid for why "iCarnegie" is a bad password?
I.
II.
III.
It is a word from the dictionary.
It does not contain numbers and symbols.
It is the name of an institution.
(a) I and II only
(b) I and III only
(c) II and III
(d) I, II, and III
Correct answer is (c)
Your score on this question is:
8.33
Feedback:
See section 6.2.3, subsection "Strong Passwords," in the course notes.
8.
To encrypt a message using public-key encryption scheme, which of the following
must be done?
(a) Encrypt the message using the sender's public key.
(b) Encrypt the message using the receiver's public key.
(c) Encrypt the message using the receiver's private key.
(d) Encrypt the message using the sender's private key.
Correct answer is (b)
Your score on this question is:
0.00
Feedback:
See section 6.2.1, subsection "Public Key Encryption Scheme," in the course
notes.
9.
Which of the following is true about private-key encryption schemes?
(a) The sender and the receiver have two private keys, one for encryption and one
for decryption.
(b) The sender and the receiver use the same private key.
(c) The sender and the receiver have different private keys.
(d) The sender must notify the receiver before sending a message.
Correct answer is (b)
Your score on this question is:
8.33
Feedback:
See section 6.2.1, subsection "Private Key Encryption Scheme," in the course
notes.
10.
Which of the following is correct with respect to customers providing highly
personal information across the Internet through electronic commerce
transactions?
(a) It is impossible for anybody to see the transaction on the Internet except for the
intended Web site conducting the transaction.
(b) Transactions are relatively secure between the consumer and a company's Web
site if the data is encrypted.
(c) Customers should never provide charge card information when asked to
complete an electronic commerce transaction.
(d) If a transaction is encrypted, any unauthorized parties intercepting the
transaction will take ten or more years to decrypt the information.
Correct answer is (b)
Your score on this question is:
8.33
Feedback:
See section 6.2 of the course notes.
11.
One of the most common applications of encryption is transmitting data securely
over the Web via
(a) e-mail
(b) the Secure Socket Layer (SSL)
(c) a simple substitution code
(d) a Trojan horse
Correct answer is (b)
Your score on this question is:
8.33
Feedback:
See section 6.2.3 of the course notes.
12.
With respect to public key encryption, which of the following is true of a server's
public key when transferring data across the Internet to a client computer?
(a) It is not a very secure method of encryption, because every computer is aware
of a recipient's public key value and can decrypt the data.
(b) All clients and servers use the same public key when transferring encrypted data
on the Internet.
(c) It is used by the server to decrypt information sent by a client.
(d) It is used by client computers when transferring encrypted data from that
particular server.
Correct answer is (d)
Your score on this question is:
0.00
Feedback:
See section 6.2.1 of the course notes.
Download