[Skip Breadcrumb Navigation]
:
[Skip Breadcrumb Navigation]
Home
Student Resources
Self-Assessment Quizzes
Chapter 8 MC
Chapter 8 MC
This activity contains 10 questions.
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
encrypt the message with Alice's private key and send the encrypted message to Alice.
encrypt the message with his public key and send Alice the message.
encrypt the message with Alice's public key and send Alice the message.
encrypt the message with his private key and send the encrypted message to Alice.
Using public-key cryptography, suppose Bob wants to send a message to Alice, and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should
encrypt the message with Alice's private key and send the encrypted message to Alice.
encrypt the message with his private key and send the encrypted message to Alice.
encrypt the message with his public key and send Alice the message.
encrypt the message with Alice's public key and send Alice the message.
Using public-key cryptography, suppose Bob wants to send a secret message to Alice, and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should
encrypt the message with his public key, encrypt the result with Alice's public key, and send Alice the message.
encrypt the message with Alice's public key, encrypt the result with his public key and then send the result.
encrypt the message with his private key, encrypt the result with Alice's public key, and then send the encrypted message to Alice.
encrypt the message with his private key, encrypt the result with Alice's private key, and then send the encrypted message to Alice.
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature,
Bob applies a hash function to m and then encrypts the result with Alice's public key.
Bob applies a hash function to m and then encrypts the result with his private key;
Bob applies a hash function to m and then encrypts the result with his public key;
Bob encrypts m with his private key and then applies a hash function to the result;
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
applies a de-hashing function to the digital signature and compares the result to m;
applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the result of this last operation with the message m;
applies Bob's public key to the digital signature, applies the hash function to m, and compares the results of the two operations;
none of the above
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Bob's public key;
Bob's private key;
The CA's public key.
The CA's private key;
Consider the secure e-mail examples discussed in Section 8.5 suppose Alice wants to send a message to Bob, and she wants secrecy, sender authentication and message integrity. The package that Alice sends to Bob makes use of
Alice's public key and Bob's private key.
Alice's public key and Bob's public key;
Alice's private key and Bob's private key;
Alice's private key and Bob's public key;
SSL provides
optionally client authentication
server authentication
encryption for messages sent by both client and server
all of the above
Suppose Bob is purchasing merchandise from Alice Inc. over the Internet. SSL permits
Alice Inc to determine is Bob has a good credit history
Bob to determine whether Alice Inc. is authorized to accept payment-card purchases
Bob to determine if Alice Inc. is a bona fide company
all of the above
The network layer is said to provide secrecy if
the data in IP datagrams are encrypted
the headers in IP datagrams are encrypted
both headers and data in the IP datagram are encrypted
none of the above
The Submit Answers for Grading feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Submit Answers for Grading button below will not work.
The following Submit Answers for Grading button is provided in its place and will clear your answers:
The Clear Answers and Start Over feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Clear Answers and Start Over button below will not work.
The following Clear Answers button is provided in its place and will clear your answers:
Your browser either does not support scripting or you have turned scripting off. Because of this, the answer choices will NOT appear in a different order each time the page is loaded, though that is mentioned below. Note that you do not need this feature to use this site.
Answer choices in this exercise appear in a different order each time the page
is loaded.
Copyright © 1995 - 2012
Pearson Education
. All rights reserved. Pearson Addison Wesley is an imprint of
Pearson
.
Legal Notice
|
Privacy Policy
|
Permissions
[Return to the Top of this Page]
: [Return to the Top of this Page]