|
1 | | Three security goals are _______________________________________. |
| | A) | confidentiality, cryptography, and nonrepudiation |
| | B) | confidentiality, encryption, and decryption |
| | C) | confidentiality, integrity, and availability |
| | D) | None of the choices are correct |
|
|
|
2 | | Which of the following attacks is threatening integrity? |
| | A) | Masquerading |
| | B) | Traffic Analysis |
| | C) | Denial of service |
| | D) | None of the choices are correct |
|
|
|
3 | | Which of the following attacks is threatening availability? |
| | A) | Replaying |
| | B) | Modification |
| | C) | Denial of service |
| | D) | None of the choices are correct |
|
|
|
4 | | _____________ means concealing the contents of a message by enciphering. |
| | A) | Steganography |
| | B) | Cryptography |
| | C) | Compressing |
| | D) | None of the choices are correct |
|
|
|
5 | | ______________means concealing the message by covering it with something else. |
| | A) | Cryptography |
| | B) | Steganography |
| | C) | Compressing |
| | D) | None of the choices are correct |
|
|
|
6 | | In __________cryptography, the same key is used by the sender and the receiver. |
| | A) | symmetric-key |
| | B) | asymmetric-key |
| | C) | public-key |
| | D) | None of the choices are correct |
|
|
|
7 | | In _________ cryptography, the same key is used in both directions. |
| | A) | symmetric-key |
| | B) | asymmetric-key |
| | C) | public-key |
| | D) | None of the choices are correct |
|
|
|
8 | | _________ cryptography is often used for long messages. |
| | A) | Symmetric-key |
| | B) | Asymmetric-key |
| | C) | Public-key |
| | D) | None of the choices are correct |
|
|
|
9 | | ___________ cryptography is often used for short messages. |
| | A) | Symmetric-key |
| | B) | Asymmetric-key |
| | C) | Secret-key |
| | D) | None of the choices are correct |
|
|
|
10 | | __________means that the sender and the receiver expect confidentiality. |
| | A) | Nonrepudiation |
| | B) | Integrity |
| | C) | Authentication |
| | D) | None of the choices are correct |
|
|
|
11 | | ___________ means that the data must arrive at the receiver exactly as they were sent. |
| | A) | Nonrepudiation |
| | B) | Message integrity |
| | C) | Authentication |
| | D) | None of the choices are correct |
|
|
|
12 | | ______________ can provide authentication, integrity, and nonrepudiation for a message. |
| | A) | Encryption/decryption |
| | B) | Digital signature |
| | C) | Compression |
| | D) | None of the choices are correct |
|
|
|
13 | | Digital signature does not provide _________. |
| | A) | nonrepudiation |
| | B) | privacy |
| | C) | authentication |
| | D) | Provides all of the choices |
|
|
|
14 | | In ___________, the identity of a party is verified once for the entire duration of system access. |
| | A) | entity authentication |
| | B) | message integrity |
| | C) | message authentication |
| | D) | None of the choices are correct |
|
|
|
15 | | In __________ cryptography, everyone has access to everyone's public key. |
| | A) | symmetric-key |
| | B) | asymmetric-key |
| | C) | secret-key |
| | D) | None of the choices are correct |
|
|
|
16 | | After a message is encrypted, it is called _______. |
| | A) | plaintext |
| | B) | ciphertext |
| | C) | cryptotext |
| | D) | None of the choices are correct |
|
|
|
17 | | In the asymmetric-key method used for confidentiality, which key is publicly known? |
| | A) | Encryption key only |
| | B) | Decryption key only |
| | C) | Both keys |
| | D) | None of the choices are correct |
|
|
|
18 | | In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message. |
| | A) | private key |
| | B) | public key |
| | C) | no key |
| | D) | None of the choices are correct |
|
|
|
19 | | The RSA algorithm for confidentiality uses _______ cryptography. |
| | A) | asymmetric-key |
| | B) | symmetric-key |
| | C) | substitution |
| | D) | None of the choices are correct |
|
|
|
20 | | In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______. |
| | A) | user A |
| | B) | user B |
| | C) | the network |
| | D) | None of the choices are correct |
|
|
|
21 | | In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message. |
| | A) | his or her own symmetric key |
| | B) | his or her own private key |
| | C) | his or her own public key |
| | D) | None of the choices are correct |
|
|
|
22 | | In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature. |
| | A) | her or his own public key |
| | B) | her or his own private key |
| | C) | the sender's public key |
| | D) | None of the choices are correct |
|
|
|
23 | | A _______ is a trusted third party that solves the problem of symmetric-key distribution. |
| | A) | CA |
| | B) | KDC |
| | C) | TLS |
| | D) | firewall |
|
|
|
24 | | A _______ certifies the binding between a public key and its owner. |
| | A) | CA |
| | B) | KDC |
| | C) | TLS |
| | D) | None of the choices are correct |
|
|