Вы находитесь на странице: 1из 1

Chap 9 1-Concerning virtual private networks (VPN), which of the following is not true?

It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network. 2-Which of the following is not associated with asymmetric encryption? Speed 3-The system and processes used to issue and manage asymmetric keys and digital certificates are known as public key infrastructure 4-Which of the following describes one weakness of encryption? Encrypted packets cannot be examined by a firewall. 5-Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report. This most likely explanation for this result is that the symmetric encryption key had been compromised. 6-Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman emperor, was the simple substitution of numbers for letters, for example A = 1, B = 2, etc. This is an example of symmetric key encryption 7-An electronic document that certifies the identity of the owner of a particular public key. Digital certificate 8-These systems use the same key to encrypt and to decrypt.----Symmetric encryption 9-These are used to create digital signatures.----Asymmetric encryption and hashing 10-Information encrypted with the creator's private key that is used to authenticate the sender is----digital signature. 11-Which of the following is not one of the three important factors determining the strength of any encryption system? Privacy 12-A process that takes plaintext of any length and transforms it into a short code.----Hashing 13-Which of the following descriptions is not associated with symmetric encryption? Lack of authentication 14-Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses random digits. Two documents are prepared with the same random sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352. Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of symmetric key encryption. 15-One way to circumvent the counterfeiting of public keys is by using a digital certificate. 16-In a private key system the sender and the receiver have ________, and in the public key system they have ________. the same key; two separate keys 17-Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of either the user or the provider of encrypted data 18-Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information? Providing free credit report monitoring for customers 19-On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland, Ohio. After reporting the theft, Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because the data stored on the computer was encrypted. 20-Jeff Davis took a call from a client. "Jeff, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement a virtual private network." 21-In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is privacy. 22-Jeff Davis took a call from a client. "Jeff, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement an encryption system with digital signatures."

Вам также может понравиться