Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

  1

Quizzes: Chapter 16

* Three security goals are _____.


* confidentiality, cryptography, and nonrepudiation
* confidentiality, encryption, and decryption
* confidentiality, integrity, and availability
* confidentiality, denial of service, and masquerading
Correct Answer: (c)

* Which of the following attacks is threatening integrity?


* Masquerading
* Traffic Analysis
* Denial of service
* Encoding
Correct Answer: (a)

* Which of the following attacks is threatening availability?


* Replaying
* Modification
* Denial of service
* Decoding
Correct Answer: (c)

* _____________ means concealing the contents of a message by enciphering.


* Steganography
* Cryptography
* Compressing
* Authentication
Correct Answer: (b)
  2

* ______________means concealing the message by covering it with something


else.
* Cryptography
* Steganography
* Compressing
* Authentication
Correct Answer: (b)

* In __________cryptography, the same key is used by the sender and the receiver.
* symmetric-key
* asymmetric-key
* public-key
* open-key
Correct Answer: (a)

* In _________ cryptography, the same key is used in both directions.


* symmetric-key
* asymmetric-key
* public-key
* open-key
Correct Answer: (a)

* _________ cryptography is often used for long messages.


* Symmetric-key
* Asymmetric-key
* Public-key
* Open-key
Correct Answer: (a)

* ___________ cryptography is often used for short messages.


* Symmetric-key
  3

* Asymmetric-key
* Secret-key
* Open-key
Correct Answer: (b)

* __________means that the sender and the receiver expect confidentiality.


* Nonrepudiation
* Integrity
* Authentication
* encryption and decryption
Correct Answer: (d)

* ___________ means that the data must arrive at the receiver exactly as they were
sent.
* Nonrepudiation
* Message integrity
* Authentication
* Secrecy
Correct Answer: (b)

* ______________ can provide authentication, integrity, and nonrepudiation for a


message.
* Encryption/decryption
* Digital signature
* Compression
* Key-exchange
Correct Answer: (b)

*
* In ___________, the identity of a party is verified once for the entire duration of
system access.
* entity authentication
* message integrity
  4

* message authentication
* message encryption
Correct Answer: (a)

* In __________ cryptography, everyone has access to everyone’s public key.


* symmetric-key
* asymmetric-key
* secret-key
* private-key
Correct Answer: (b)

* In the asymmetric-key method used for confidentiality, which key(s) is (are)


publicly known?
* encryption key only
* decryption key only
* both encryption and decryption keys
* neither encryption key nor decryption key
Correct Answer: (b)

* The RSA algorithm for confidentiality uses _______ cryptography.


* asymmetric-key
* symmetric-key
* substitution
* transposition
Correct Answer: (a)

* In RSA, if user A wants to send an encrypted message to user B, the plaintext is


encrypted with the public key of _______.
* user A
* user B
* the network
* a third party.
Correct Answer: (b)
  5

You might also like