You are on page 1of 3

1. Which of the following mail standards relies on a "Web of Trust"?

A) PGP B) Secure Multipurpose Internet Mail Extensions (S/MIME) C) Privicy Enhanced Mail (PEM) D) MIME Object Security Services (MOSS) Feedback: See page 247 and the slides. Correct Answer(s): A 2. What are types of ciphers? A) transposition and shift B) transposition and substitution C) transposition and permutation D) substitution and replacement Feedback: See page 231. Correct Answer(s): B 3. Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard|? A) RC6 B) Rijndael C) Serpent D) Twofish Feedback: See page 245. Correct Answer(s): B 4. Why does a digital signature contain a message digest? A) to confirm the identity of the sender B) to aid the detection of any alternation of the message C) to indicate the encryption algorithm D) to enable transmission in a digital format Feedback: See page 239. Correct Answer(s): B 5. Which of the following algorithms is used today for encryption in PGP? A) RC5 B) RSA C) IDEA D) Blowfish Feedback: See page 247. Correct Answer(s): B 6. Which of the following offer confidentiality to an email message? A) the sender encrypting with the receiver's public key B) the sender encrypting with the receiver's private key

C) the sender encrypting with his private key D) the sender encrypting with his public key Feedback: See page 242. Correct Answer(s): A 7. What is called the substitution cipher that shifts the alphabet by 13 places? A) ROT13 cipher B) transposition cipher C) polyalphabetic cipher D) Caesar cipher Feedback: See page 237. Correct Answer(s): A 8. Which of the following statements about a symmetric (aka private) key cryptosyst em is false? A) The key used for decryption is known to the sender. B) DES is a typical private key cryptosystem. C) The encryption key should be secure. D) different keys are used for encryption and decryption. Feedback: See page 236. Correct Answer(s): D 9. Which of the following standards concerns digital certificates? A) X.400 B) X.25 C) X.75 D) X.509 Feedback: See page 242. Correct Answer(s): D 10. What attribute is included in an X.509 digital certificate? A) the key pair of the certificate holder B) distinguished name of the subject C) the telephone number of the department D) secret key of the issuing CA Feedback: See page 243. Correct Answer(s): B 11. Which of the following was developed as a means of preventing fraud from occurri ng during electronic payments A) Secure Shell (SSH-2) B) Secure Electronic Transaction (SET) C) MONDEX D) Secure HTML (S-HTML)

Feedback: See page 248. Correct Answer(s): B 12. A message is said to be digitally signed if sent with which of the following? A) message digest encrypted with the sender's public key B) message digest encrypted with the sender's private key C) message digest D) message and sender's digital certificate Feedback: See page 239. Correct Answer(s): B 13. DES algorithm is an example of what type of encryption? A) public key B) asymmetric key C) two-key D) symmetric key Feedback: See page 236. Correct Answer(s): D

You might also like