Escolar Documentos
Profissional Documentos
Cultura Documentos
TRUE/FALSE QUESTIONS:
T F 1. MIME is an extension to the old RFC 822 specification of an Internet
mail format.
T F 4. The recipient of a message can decrypt the signature using DSS and the
sender’s public DSS key.
T F 8. SMTP is used between the message user agent and the mail submission
agent.
T F 12. Most browsers come equipped with SSL and most Web servers have
implemented the protocol.
A. MEM B. MIME
C. MSC D. DKIM
2. The ________ function consists of encrypted content of any type and encrypted-
content encryption keys for one or more recipients.
3. In the case of ________ only the digital signature is encoded using base64.
4. The result of S/MIME encrypting the digest using DSS and the sender’s private DSS
key is the ________.
5. To protect the data, either the signature alone or the signature plus the message are
mapped into printable ASCII characters using a scheme known as ________ or
base64mapping.
A. radix-64 B. ASCII-64
7. At its most fundamental level the Internet mail architecture consists of a user world in
the form of _________.
A. MHS B. MSA
C. MUA D. MDA
Computer Security: Principles and Practice, 4th Edition, Global Edition Chapter 22
8. The ______ is responsible for transferring the message from the MHS to the MS.
A. MDA B. MS
C. MUA D. MSA
9. The ________ accepts the message submitted by a message user agent and enforces
the policies of the hosting domain and the requirements of Internet standards.
A. padding B. tunnel
C. payload D. sequence
C. a redirect message comes from the router to which the initial packet
was sent
15. The _______ field in the outer IP header indicates whether the association is an AH
or ESP security association.
digital
3. A _________ is formed by taking the message digest of the content to be signed
signature
and then encrypting that with the private key of the signer.
4. A signed data message can only be viewed by a recipient with __________
S/MIME
capability.
5. The default algorithms used for signing S/MIME messages are SHA-1 and the
_________.
Digital Signature Standard ( DSS)
6. The default algorithms used for encrypting S/MIME messages are the triple
DES and a public-key scheme known as _______.
ElGamal
7. If encryption is used alone, _______ is used to convert the ciphertext to ASCII
Radix-64
format.
Domainkeys
Identified Mail
8. _________ is a specification for cryptographically signing e-mail messages,
(DKIM)
alert
12. The _________ is used to convey SSL-related alerts to the peer entity.
protocol
13. Your lecturer’s name for this subject is ___________________.
14. A security association is uniquely identified by three parameters: security
parameter index, protocol identifier, and ________________.
IP destination address
15. IP-level security encompasses three functional areas: authentication,
confidentiality, and _________.
key management
16. IPsec provides two main functions: a combined authentication/encryption
function called ___________ and a key exchange function.
Encapsulating
Security
Payload
( ESP )