Deck 19: Electronic Mail Security

Full screen (f)
exit full mode
Question
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
Use Space or
up arrow
down arrow
to flip the card.
Question
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.

A)two
B)four
C)six
D)three
Question
PGP incorporates tools for developing public-key certificate management and a public-key trust model.
Question
The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication.

A)key ID of the sender's public key
B)timestamp
C)filename
D)leading two octets of message digest
Question
PGP provides authentication through the use of _________ .

A)asymmetric block encryption
B)symmetric block encryption
C)radix-64
D)digital signatures
Question
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.

A)S/MIME
B)MIME
C)DKIM
D)HTTPS
Question
The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.
Question
To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.
Question
Only single user IDs may be associated with a single public key on the public-key ring.
Question
Native form is a format,appropriate to the content type,that is standardized for use between systems.
Question
A means of generating predictable PGP session keys is needed.
Question
As a default,PGP compresses the message after applying the signature but before encryption.
Question
PGP provides e-mail compatibility using the __________ encoding scheme.

A)radix-64
B)MIME
C)digital signature
D)symmetric block
Question
A message component includes the actual data to be stored or transmitted as well as a filename and a timestamp that specifies the time of creation.
Question
For the text type of body no special software is required to get the full meaning of the text aside from support of the indicated character set.
Question
PGP provides confidentiality through the use of asymmetric block encryption.
Question
The key legitimacy field is derived from the collection of signature trust fields in the entry.
Question
Each PGP entity must maintain a file of its own public/private key pairs as well as a file of private keys of correspondents.
Question
PGP has a very rigid public-key management scheme.
Question
The MIME-Version field must have the parameter value 1.0 in order for the message to conform to RFCs 2045 and 2046.
Question
The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data.

A)Content-Type
B)Content-Description
C)Content-ID
D)Content-Transfer-Encoding
Question
PGP makes use of four types of keys: public keys,private keys,one-time session keys,and ___________ symmetric keys.
Question
The __________ field is used to identify MIME entities uniquely in multiple contexts.

A)Content-Transfer- Encoding
B)Content-ID
C)Content-Description
D)Content-Type
Question
The key legitimacy field,the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .
Question
The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards.

A)Message Store
B)Mail Submission Agent
C)Message Transfer Agent
D)Mail Delivery Agent
Question
PGP provides compression using the __________ algorithm.
Question
To provide transparency for e-mail applications,an encrypted message may be converted to an ASCII string using _________ conversion.
Question
Video content will be identified as _________ type.

A)GIF
B)MPEG
C)BMP
D)JPEG
Question
S/MIME cryptographic algorithms use __________ to specify requirement level.

A)CAN and MUST
B)SHOULD and CAN
C)SHOULD and MIGHT
D)SHOULD and MUST
Question
The _________ type refers to other kinds of data,typically either uninterpreted binary data or information to be processed by a mail-based application.
Question
MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP.

A)RFC 821
B)RFC 5322
C)RFC 3852
D)RFC 4871
Question
Computed by PGP,a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user;the higher the level of trust,the stronger the binding of this user ID to this key.
Question
For the __________ subtype the order of the parts is not significant.

A)multipart/mixed
B)multipart/digest
C)multipart/alternative
D)multipart/parallel
Question
The __________ subtype is used when the different parts are independent but are to be transmitted together.They should be presented to the receiver in the order that they appear in the mail message.

A)multipart/digest
B)multipart/parallel
C)multipart/mixed
D)multipart/alternative
Question
__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.
Question
E-banking,personal banking,e-commerce server,software validation and membership-based online services all fall into the VeriSign Digital ID _________ .

A)Class 4
B)Class 3
C)Class 1
D)Class 2
Question
Typically housed in the user's computer,a _________ is referred to as a client e-mail program or a local network e-mail server.

A)Mail Submission Agent
B)Message Transfer Agent
C)Message Store
D)Message User Agent
Question
The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.
Question
___________ is an open-source,freely available software package for e-mail security.
Question
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.
Question
The _________ transfer encoding,also known as radix-64 encoding,is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.
Question
A specification for cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream,_________ allow message recipients to verify the signature by querying the signer's domain directly to retrieve the appropriate public key and thereby confirming that the message was attested to by a party in possession of the private key for the signing domain.
Question
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer,which is then encoded using base64 encoding.
Question
The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Question
S/MIME provides the following functions: enveloped data,signed data,clear signed data,and ________ .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Electronic Mail Security
1
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
True
2
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.

A)two
B)four
C)six
D)three
A
3
PGP incorporates tools for developing public-key certificate management and a public-key trust model.
True
4
The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication.

A)key ID of the sender's public key
B)timestamp
C)filename
D)leading two octets of message digest
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
PGP provides authentication through the use of _________ .

A)asymmetric block encryption
B)symmetric block encryption
C)radix-64
D)digital signatures
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.

A)S/MIME
B)MIME
C)DKIM
D)HTTPS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The objective of MIME Transfer Encodings is to provide reliable delivery across the largest range of environments.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
To enhance security an encrypted message is not accompanied by an encrypted form of the session key that was used for message encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Only single user IDs may be associated with a single public key on the public-key ring.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Native form is a format,appropriate to the content type,that is standardized for use between systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A means of generating predictable PGP session keys is needed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
As a default,PGP compresses the message after applying the signature but before encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
PGP provides e-mail compatibility using the __________ encoding scheme.

A)radix-64
B)MIME
C)digital signature
D)symmetric block
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
A message component includes the actual data to be stored or transmitted as well as a filename and a timestamp that specifies the time of creation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
For the text type of body no special software is required to get the full meaning of the text aside from support of the indicated character set.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
PGP provides confidentiality through the use of asymmetric block encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The key legitimacy field is derived from the collection of signature trust fields in the entry.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Each PGP entity must maintain a file of its own public/private key pairs as well as a file of private keys of correspondents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
PGP has a very rigid public-key management scheme.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The MIME-Version field must have the parameter value 1.0 in order for the message to conform to RFCs 2045 and 2046.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data.

A)Content-Type
B)Content-Description
C)Content-ID
D)Content-Transfer-Encoding
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
PGP makes use of four types of keys: public keys,private keys,one-time session keys,and ___________ symmetric keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The __________ field is used to identify MIME entities uniquely in multiple contexts.

A)Content-Transfer- Encoding
B)Content-ID
C)Content-Description
D)Content-Type
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The key legitimacy field,the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards.

A)Message Store
B)Mail Submission Agent
C)Message Transfer Agent
D)Mail Delivery Agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
PGP provides compression using the __________ algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
To provide transparency for e-mail applications,an encrypted message may be converted to an ASCII string using _________ conversion.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Video content will be identified as _________ type.

A)GIF
B)MPEG
C)BMP
D)JPEG
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
S/MIME cryptographic algorithms use __________ to specify requirement level.

A)CAN and MUST
B)SHOULD and CAN
C)SHOULD and MIGHT
D)SHOULD and MUST
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The _________ type refers to other kinds of data,typically either uninterpreted binary data or information to be processed by a mail-based application.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP.

A)RFC 821
B)RFC 5322
C)RFC 3852
D)RFC 4871
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Computed by PGP,a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user;the higher the level of trust,the stronger the binding of this user ID to this key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
For the __________ subtype the order of the parts is not significant.

A)multipart/mixed
B)multipart/digest
C)multipart/alternative
D)multipart/parallel
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The __________ subtype is used when the different parts are independent but are to be transmitted together.They should be presented to the receiver in the order that they appear in the mail message.

A)multipart/digest
B)multipart/parallel
C)multipart/mixed
D)multipart/alternative
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
__________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
E-banking,personal banking,e-commerce server,software validation and membership-based online services all fall into the VeriSign Digital ID _________ .

A)Class 4
B)Class 3
C)Class 1
D)Class 2
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Typically housed in the user's computer,a _________ is referred to as a client e-mail program or a local network e-mail server.

A)Mail Submission Agent
B)Message Transfer Agent
C)Message Store
D)Message User Agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
___________ is an open-source,freely available software package for e-mail security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The _________ transfer encoding,also known as radix-64 encoding,is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A specification for cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream,_________ allow message recipients to verify the signature by querying the signer's domain directly to retrieve the appropriate public key and thereby confirming that the message was attested to by a party in possession of the private key for the signing domain.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer,which is then encoded using base64 encoding.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
S/MIME provides the following functions: enveloped data,signed data,clear signed data,and ________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.