Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may require some improvement. The answers to the questions can be found in the Assessments section at the end of this book.
- Which of the following components prevents a person from denying a transaction?
A. Integrity
B. Origin authentication
C. Non-repudiation
D. Confidentiality
- Which method allows a hacker to have access to the ciphertext and has knowledge of some information regarding the plaintext message?
A. Brute force
B. MiTM
C. Chosen-plaintext
D. Known-plaintext
- Which of the following can be used to validate the origin authenticity of a message?
A. HMAC
B. MD5
C. SHA-1
D. SHA-2
- Which of the following is not a block cipher algorithm?
A. AES
B. SEAL
C. 3DES
D. DES
- Which of the following is used to securely distribute a public key over an unsecure network?
A. AES
B. RSA
C. DSA
D. DH
- A digital certificate contains data in which of the following formats...