Info Sec & Network Quiz Chapter 8
Your public key
What do others need to decrypt files that you have encrypted with your private key?
GPG
What file extension does Kleopatra add to an encrypted file?
Kleopatra
What is the certificate management component of GPG4Win?
Change the trust level
What must you do to any certificate imported into Kleopatra before you can use it to decrypt messages?
Send Certificate By EMail
When the key is successfully created, which of the following creates a new e-mail and automatically attaches your public key certificate?
Upload Certificate To Directory Service
When the key is successfully created, which of the following options lets you store your certificate on a public internet server?
Make a Backup Of Your Key Pair
When the key is successfully created, which of the following options sends a copy of your private key to your computer?
A comment will be visible to the receiver
Which of the following is true regarding comments in the Certificate Creation Wizard?
The receiver obtains the needed key from the sender or through a trusted third party, such as a certificate server.
Which of the following statements is true regarding asymmetrical encryption?
The sender and receiver use the same key to encrypt and decrypt a given message
Which of the following statements is true regarding symmetric cryptography?
It provides the same full C-I-A protection as asymmetrical encryption with nearly the same speed as symmetrical encryption.
Which of the following statements is true regarding the hybrid approach to encryption?
one possesses the correct key
Cryptography takes human readable information and makes it unreadable "cipher text" which can only be read if
a unique 40-character fingerprint
Each time a key pair is created, Kleopatra generates:
Compare the decrypted file's contents with the contents of the original file
How can you verify that the integrity of encrypted files is maintained during the transmission to another user's computer?
Right-click the file and select Sign and Encrypt from the context menu
How do you encrypt a text message using the keys you created in the lab?
No because you must provide your public key to any user wanting to decrypt any message encrypted by you
If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?
Your public key
If you and another person want to encrypt messages, what should you provide that person with?
Certificate Details screen
In Kleopatra, each new certificate is created with no expiration (valid until) date, but you can set an expiration date in the:
certificates
Keys are also referred to as:
A passphrase, or password
To complete the creation of a key, what do you need to enter in the pinentry dialog box?