Name:     ID: 
 
    Email: 

CNG 131 Chapter 14

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

When data is encrypted, it becomes an unreadable series of symbols and numbers called ciphertext.
 

 2. 

Modern cryptography uses algorithms to encrypts and decrypt data.
 

 3. 

Stream algorithms operate on the plaintext one bit at a time.
 

 4. 

Cryptography allows users to transmit sensitive information over unsecured networks and can be either strong or weak.
 

 5. 

Using nonrepudiation, a data sender can disavow that he or she did or did not send a certain piece of information.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

A credential that allows a recipient to verify whether a public key belongs to its owner is called a(n):
a.
keyring
c.
direct trust
b.
digital certificate
d.
key escrow
 

 7. 

A complex mathematical function that is used extensively in cryptography is called a(n):
a.
ciphertext
c.
introducer
b.
plaintext
d.
algorithm
 

 8. 

What is an example of a unique identifier on a certificate?
a.
fingerprint
c.
keyring
b.
hashing
d.
direct trust
 

 9. 

A database that allows users to submit and retrieve digital certificates is called a(n):
a.
distinguished name
c.
certificate server
b.
block algorithm
d.
None of the above
 

 10. 

A trust model where the user trusts a key because the user knows where it came from is called a(n):
a.
direct trust
c.
limited trust
b.
hierarchical trust
d.
All of the above
 

 11. 

What is a list of trusted certificates called?
a.
nonrepudiation
c.
keyring
b.
ciphertext
d.
plaintext
 

 12. 

What is data called that can be read without any manipulation?
a.
ciphertext
c.
readable text
b.
encrypted text
d.
plaintext
 

 13. 

What are other users on a system who sign the keys of friends to verify their validity?
a.
introducers
c.
certificate server
b.
fingerprint
d.
None of the above
 

 14. 

What is plaintext called that has been encrypted and is in an unreadable series of symbols and numbers?
a.
nonrepudiation
c.
coded text
b.
block algorithms
d.
ciphertext
 

 15. 

What is the published document called that explains to all users how the CA is structured?
a.
certificate revocation list
c.
certificate policy
b.
certificate practice statement
d.
certificate server
 

 16. 

An algorithm that encrypts and decrypts data in groups of bits is called a(n):
a.
block algorithm
c.
stream algorithm
b.
asymmetric algorithm
d.
symmetric algorithm
 

 17. 

What is another name for a public key algorithm, a method that uses different encryption and decryption keys?
a.
block algorithm
c.
stream algorithm
b.
asymmetric algorithm
d.
symmetric algorithm
 

 18. 

A unique identifier that is bound to a certificate by a certificate authority is called a(n):
a.
certification authority
c.
key escrow
b.
digital signature
d.
distinguished name
 

 19. 

An algorithm where the encryption key can be calculated from the decryption key and vice versa is called a(n):
a.
block algorithm
c.
stream algorithm
b.
asymmetric algorithm
d.
symmetric algorithm
 

 20. 

What is the trust model called that combines the concepts of direct trust and hierarchical trust?
a.
web of trust
c.
direct trust
b.
certificate policy
d.
None of the above
 

 21. 

A trusted person or group responsible for issuing certificates to authorized users on a system is called a(n):
a.
certificate revocation list
c.
certificate practice statement
b.
certification authority
d.
All of the above
 

 22. 

What is a key administration process that utilizes a third party called?
a.
keyring
c.
nonrepudiation
b.
hashing
d.
key escrow
 

 23. 

What is a benefit of cryptography where the sender of the data cannot disavow that they did or didn't send the information?
a.
nonrepudiation
c.
direct trust
b.
ciphertext
d.
certificate policy
 

 24. 

What establishes who may serve as a CA, what types of certificates may be issued, and how the CA is structured?
a.
certificate server
c.
digital certificates
b.
certificate policy
d.
digital signatures
 

 25. 

What does OCSP stand for?
a.
Online Certificate Status Protocol
c.
Only Certificate Status Protocol
b.
Online Certificate Server Protocol
d.
None of the above
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
hierarchical trust
e.
certificate server
b.
direct trust
f.
certificate authority
c.
encryption
g.
keyring
d.
algorithm
h.
plaintext
 

 26. 

Method of disguising plaintext to hide its substance.
 

 27. 

Data that can be read without any manipulation.
 

 28. 

Database that allows users to submit and retrieve digital certificates.
 

 29. 

Trust model based on a number of root certificates.
 

 30. 

Complex mathematical function that is used extensively in cryptography.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
keyring
e.
block algorithm
b.
symmetric algorithm
f.
validity
c.
stream algorithm
g.
ciphertext
d.
hashing
h.
fingerprint
 

 31. 

Establishes that a public key certificate does belong to its owner.
 

 32. 

Algorithm that converts plaintext one bit at a time.
 

 33. 

A list of trusted certificates.
 

 34. 

A unique identifier on a certificate.
 

 35. 

Algorithm that encrypts and decrypts data in groups of bits.
 



 
Submit          Reset Help