Course
Theories Of Security Management
Test
Week 11 Final Exam
Started
12/16/14 7:58 AM
Submitted
12/16/14 8:25 AM
Status
Completed
Attempt Score
100 out of 100 points
Time Elapsed
26 minutes out of 2 hours.
Instructions
This final exam consists of 50 multiple choice questions and covers the material in Chapters 5 through 10.
Question 1
2 out of 2 points
Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take?
Answer
Selected Answer: Request a new public key from Party A
Correct Answer: Request a new public key from Party A
Question 2
2 out of 2 points
The purpose of the Diffie-Hellman key exchange protocol is:
Answer
Selected Answer: To permit two parties who have never communicated to establish a secret encryption key
Correct Answer: To permit two parties who have never communicated to establish a secret encryption key
Question 3
2 out of 2 points
Public key cryptography is another name for:
Answer
Selected Answer: Asymmetric cryptography
Correct Answer: Asymmetric cryptography
Question 4
2 out of 2 points
All of the following statements about the polyalphabetic cipher are true EXCEPT:
Answer
Selected Answer: It is a form of one-time pad
Correct Answer: It is a form of one-time pad
Question 5
2 out of 2 points
In modulo arithmetic, when A – B < 0, then:
Answer
Selected Answer: 26 is added to the result
Correct Answer: 26 is added to the result
Question 6
2 out of 2 points
Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin?
Answer
Selected Answer: The receiving party should send its public encryption key to the transmitting party.
Correct Answer: The receiving party should send its public encryption key to the transmitting