![](/olcweb/styles/shared/spacer.gif) |
1 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) Three security goals are _______________________________________. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | confidentiality, cryptography, and nonrepudiation |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | confidentiality, encryption, and decryption |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | confidentiality, integrity, and availability |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
2 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) Which of the following attacks is threatening integrity? |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Masquerading |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Traffic Analysis |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Denial of service |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
3 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) Which of the following attacks is threatening availability? |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Replaying |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Modification |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Denial of service |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
4 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) _____________ means concealing the contents of a message by enciphering. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Steganography |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Cryptography |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Compressing |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
5 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) ______________means concealing the message by covering it with something else. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Cryptography |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Steganography |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Compressing |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
6 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In __________cryptography, the same key is used by the sender and the receiver. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | symmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | asymmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | public-key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
7 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In _________ cryptography, the same key is used in both directions. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | symmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | asymmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | public-key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
8 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) _________ cryptography is often used for long messages. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Symmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Asymmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Public-key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
9 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) ___________ cryptography is often used for short messages. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Symmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Asymmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Secret-key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
10 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) __________means that the sender and the receiver expect confidentiality. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Nonrepudiation |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Integrity |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Authentication |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
11 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) ___________ means that the data must arrive at the receiver exactly as they were sent. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Nonrepudiation |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Message integrity |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Authentication |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
12 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) ______________ can provide authentication, integrity, and nonrepudiation for a message. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Encryption/decryption |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Digital signature |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Compression |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
13 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) Digital signature does not provide _________. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | nonrepudiation |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | privacy |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | authentication |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | Provides all of the choices |
|
|
![](/olcweb/styles/shared/spacer.gif) |
14 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In ___________, the identity of a party is verified once for the entire duration of system access. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | entity authentication |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | message integrity |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | message authentication |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
15 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In __________ cryptography, everyone has access to everyone's public key. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | symmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | asymmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | secret-key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
16 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) After a message is encrypted, it is called _______. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | plaintext |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | ciphertext |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | cryptotext |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
17 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In the asymmetric-key method used for confidentiality, which key is publicly known? |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | Encryption key only |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | Decryption key only |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | Both keys |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
18 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | private key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | public key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | no key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
19 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) The RSA algorithm for confidentiality uses _______ cryptography. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | asymmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | symmetric-key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | substitution |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
20 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | user A |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | user B |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | the network |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
21 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | his or her own symmetric key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | his or her own private key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | his or her own public key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
22 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | her or his own public key |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | her or his own private key |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | the sender's public key |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|
![](/olcweb/styles/shared/spacer.gif) |
23 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) A _______ is a trusted third party that solves the problem of symmetric-key distribution. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | CA |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | KDC |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | TLS |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | firewall |
|
|
![](/olcweb/styles/shared/spacer.gif) |
24 | ![](/olcweb/styles/shared/spacer.gif) | ![](/olcweb/styles/shared/spacer.gif) A _______ certifies the binding between a public key and its owner. |
| ![](/olcweb/styles/shared/spacer.gif) | A)![](/olcweb/styles/shared/spacer.gif) | CA |
| ![](/olcweb/styles/shared/spacer.gif) | B)![](/olcweb/styles/shared/spacer.gif) | KDC |
| ![](/olcweb/styles/shared/spacer.gif) | C)![](/olcweb/styles/shared/spacer.gif) | TLS |
| ![](/olcweb/styles/shared/spacer.gif) | D)![](/olcweb/styles/shared/spacer.gif) | None of the choices are correct |
|
|