ESAT Forouzan - Chapter 30: Message Security, User Authentication and Key Management Flashcards

1
Q

If user A wants to send an encrypted message to user B, the Plaintext is encrypted with the public key of _______.
a. User A
b. User B
c. The network
d. a or b

A

b. User B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When symmetric-key encryption is combined with private-key encryption, the _______ key is encrypted with the public key.
a. Private
b. Public
c. Symmetric
d. Skeleton

A

c. Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the digital signature technique, the sender of the message uses _______ to create ciphertext.
a. His or her own symmetric key
b. His or her own private key
c. His or her public key
d. The receiver’s private key

A

b. His or her own private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the digital signature technique, the receiver of the message uses _______ to create plaintext.
a. His or her own symmetric key
b. His or her own private key
c. His or her own public key
d. The sender’s public key

A

d. The sender’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _______ is a trusted third party that solves the problem of symmetric-key distribution.
a. CA
b. KDC
c. TLS
d. Firewall

A

b. KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _______ certifies the bonding between a public key and its owner.
a. CA
b. KDC
c. TLS
d. Firewall

A

a. CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a _______ attack, a message captured by an intruder is illegally sent a second time.
a. Return
b. Man-in-the-middle
c. Bucket brigade
d. Replay

A

d. Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _______ is a large number used only once that helps distinguish a fresh authentication request from a repeated one.
a. Ticket
b. Nonce
c. Realm
d. Public key

A

b. Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
a. 10
b. 20
c. 45
d. 90

A

c. 45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos

A

a. Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a ________ attack, an intruder comes between two communicating parties, intercepting and replying to their messages.
a. Return
b. Man-in-the-Middle
c. Bucket-in-the-Middle
d. Replay

A

b. Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate.
a. KDC
b. CA
c. PKI
d. TGS

A

a. KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the _______ protocol, a nonce is decremented by 1 so that an intruder cannot send the exact same message a second time.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos

A

b. Needham-Schroeder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ is an authentication protocol that needs an authentication server and a ticket-granting server.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos

A

d. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _______ is the KDC in the Kerberos protocol.
a. AS
b. TGS
c. Real server
d. Data server

A

a. AS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The _______ issues tickets for the real server.
a. AS
b. TGS
c. Real server
d. Data server

A

a. AS

17
Q

In _______-key cryptography, everyone has access to all the public keys.
a. Private
b. Symmetric
c. Public
d. Certified

A

b. Symmetric

18
Q

A protocol called _______ describes the certificate issued by a CA in a structural way.
a. X.509
b. CA level 1
c. KDC
d. Kerberos

A

a. X.509

19
Q

Windows 2000 uses an authentication protocol called ________.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos

A

d. Kerberos