Deck 8: Electronic Mail Security

Full screen (f)
exit full mode
Question
A means of generating predictable PGP session keys is needed.
Use Space or
up arrow
down arrow
to flip the card.
Question
The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.
Question
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
Question
The MIME-Version field must have the parameter value 1.0 in order for the message to conform to RFCs 2045 and 2046.
Question
PGP has a very rigid public-key management scheme.
Question
The key legitimacy field is derived from the collection of signature trust fields in the entry.
Question
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication

A)two
B)four
C)six
D)three
Question
The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication

A)key ID of the sender's public key B.timestamp
C)filename D.leading two octets of message digest
Question
For the text type of body no special software is required to get the full meaning of the text aside from support of the indicated character set.
Question
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP

A)S/MIME
B)MIME
C)DKIM
D)HTTPS
Question
To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.
Question
Native form is a format, appropriate to the content type, that is standardized for use between systems.
Question
A message component includes the actual data to be stored or transmitted as well as a filename and a timestamp that specifies the time of creation.
Question
PGP provides confidentiality through the use of asymmetric block encryption.
Question
PGP provides e-mail compatibility using the __________ encoding scheme

A)radix-64
B)MIME
C)digital signature
D)symmetric block
Question
PGP incorporates tools for developing public-key certificate management and a public-key trust model.
Question
As a default, PGP compresses the message after applying the signature but before encryption.
Question
Only single user IDs may be associated with a single public key on the public-key ring.
Question
PGP provides authentication through the use of _________

A)asymmetric block encryption
B)symmetric block encryption
C)radix-64
D)digital signatures
Question
Each PGP entity must maintain a file of its own public/private key pairs as well as a file of private keys of correspondents.
Question
S/MIME cryptographic algorithms use __________ to specify requirement level

A)CAN and MUST
B)SHOULD and CAN
C)SHOULD and MIGHT
D)SHOULD and MUST
Question
The __________ subtype is used when the different parts are independent but are to be transmitted together.They should be presented to the receiver in the order that they appear in the mail message

A)multipart/digest
B)multipart/parallel
C)multipart/mixed
D)multipart/alternative
Question
PGP makes use of four types of keys: public keys, private keys, one-time session keys, and ___________ symmetric keys.
Question
Typically housed in the user's computer, a _________ is referred to as a client e-mail program or a local network e-mail server

A)Mail Submission Agent
B)Message Transfer Agent
C)Message Store
D)Message User Agent
Question
PGP provides compression using the __________ algorithm.
Question
The key legitimacy field, the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .
Question
Computed by PGP, a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user; the higher the level of trust, the stronger the binding of this user ID to this key.
Question
E-banking, personal banking, e-commerce server, software validation and membership-based online services all fall into the VeriSign Digital ID _________

A)Class 4
B)Class 3
C)Class 1
D)Class 2
Question
To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII string using _________ conversion.
Question
The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards

A)Message Store
B)Mail Submission Agent
C)Message Transfer Agent
D)Mail Delivery Agent
Question
The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application.
Question
Video content will be identified as _________ type

A)GIF
B)MPEG
C)BMP
D)JPEG
Question
The __________ field is used to identify MIME entities uniquely in multiple contexts

A)Content-Transfer- Encoding
B)Content-ID
C)Content-Description
D)Content-Type
Question
The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data

A)Content-Type
B)Content-Description
C)Content-ID
D)Content-Transfer-Encoding
Question
MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP

A)RFC 821
B)RFC 5322
C)RFC 3852
D)RFC 4871
Question
The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.
Question
__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.
Question
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.
Question
For the __________ subtype the order of the parts is not significant

A)multipart/mixed
B)multipart/digest
C)multipart/alternative
D)multipart/parallel
Question
___________ is an open-source, freely available software package for e-mail security.
Question
S/MIME provides the following functions: enveloped data, signed data, clear signed data, and ________ .
Question
A specification for cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream, _________ allow message recipients to verify the signature by querying the signer's domain directly to retrieve the appropriate public key and thereby confirming that the message was attested to by a party in possession of the private key for the signing domain.
Question
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer, which is then encoded using base64 encoding.
Question
The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.
Question
The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Electronic Mail Security
1
A means of generating predictable PGP session keys is needed.
False
2
The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.
True
3
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
True
4
The MIME-Version field must have the parameter value 1.0 in order for the message to conform to RFCs 2045 and 2046.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
PGP has a very rigid public-key management scheme.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The key legitimacy field is derived from the collection of signature trust fields in the entry.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication

A)two
B)four
C)six
D)three
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication

A)key ID of the sender's public key B.timestamp
C)filename D.leading two octets of message digest
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
For the text type of body no special software is required to get the full meaning of the text aside from support of the indicated character set.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP

A)S/MIME
B)MIME
C)DKIM
D)HTTPS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Native form is a format, appropriate to the content type, that is standardized for use between systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A message component includes the actual data to be stored or transmitted as well as a filename and a timestamp that specifies the time of creation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
PGP provides confidentiality through the use of asymmetric block encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
PGP provides e-mail compatibility using the __________ encoding scheme

A)radix-64
B)MIME
C)digital signature
D)symmetric block
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
PGP incorporates tools for developing public-key certificate management and a public-key trust model.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
As a default, PGP compresses the message after applying the signature but before encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Only single user IDs may be associated with a single public key on the public-key ring.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
PGP provides authentication through the use of _________

A)asymmetric block encryption
B)symmetric block encryption
C)radix-64
D)digital signatures
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Each PGP entity must maintain a file of its own public/private key pairs as well as a file of private keys of correspondents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
S/MIME cryptographic algorithms use __________ to specify requirement level

A)CAN and MUST
B)SHOULD and CAN
C)SHOULD and MIGHT
D)SHOULD and MUST
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The __________ subtype is used when the different parts are independent but are to be transmitted together.They should be presented to the receiver in the order that they appear in the mail message

A)multipart/digest
B)multipart/parallel
C)multipart/mixed
D)multipart/alternative
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
PGP makes use of four types of keys: public keys, private keys, one-time session keys, and ___________ symmetric keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Typically housed in the user's computer, a _________ is referred to as a client e-mail program or a local network e-mail server

A)Mail Submission Agent
B)Message Transfer Agent
C)Message Store
D)Message User Agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
PGP provides compression using the __________ algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The key legitimacy field, the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Computed by PGP, a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user; the higher the level of trust, the stronger the binding of this user ID to this key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
E-banking, personal banking, e-commerce server, software validation and membership-based online services all fall into the VeriSign Digital ID _________

A)Class 4
B)Class 3
C)Class 1
D)Class 2
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII string using _________ conversion.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards

A)Message Store
B)Mail Submission Agent
C)Message Transfer Agent
D)Mail Delivery Agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Video content will be identified as _________ type

A)GIF
B)MPEG
C)BMP
D)JPEG
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The __________ field is used to identify MIME entities uniquely in multiple contexts

A)Content-Transfer- Encoding
B)Content-ID
C)Content-Description
D)Content-Type
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data

A)Content-Type
B)Content-Description
C)Content-ID
D)Content-Transfer-Encoding
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP

A)RFC 821
B)RFC 5322
C)RFC 3852
D)RFC 4871
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
For the __________ subtype the order of the parts is not significant

A)multipart/mixed
B)multipart/digest
C)multipart/alternative
D)multipart/parallel
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
___________ is an open-source, freely available software package for e-mail security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
S/MIME provides the following functions: enveloped data, signed data, clear signed data, and ________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A specification for cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream, _________ allow message recipients to verify the signature by querying the signer's domain directly to retrieve the appropriate public key and thereby confirming that the message was attested to by a party in possession of the private key for the signing domain.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer, which is then encoded using base64 encoding.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.