Info Sec & Network Quiz Chapter 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Your public key

What do others need to decrypt files that you have encrypted with your private key?

GPG

What file extension does Kleopatra add to an encrypted file?

Kleopatra

What is the certificate management component of GPG4Win?

Change the trust level

What must you do to any certificate imported into Kleopatra before you can use it to decrypt messages?

Send Certificate By EMail

When the key is successfully created, which of the following creates a new e-mail and automatically attaches your public key certificate?

Upload Certificate To Directory Service

When the key is successfully created, which of the following options lets you store your certificate on a public internet server?

Make a Backup Of Your Key Pair

When the key is successfully created, which of the following options sends a copy of your private key to your computer?

A comment will be visible to the receiver

Which of the following is true regarding comments in the Certificate Creation Wizard?

The receiver obtains the needed key from the sender or through a trusted third party, such as a certificate server.

Which of the following statements is true regarding asymmetrical encryption?

The sender and receiver use the same key to encrypt and decrypt a given message

Which of the following statements is true regarding symmetric cryptography?

It provides the same full C-I-A protection as asymmetrical encryption with nearly the same speed as symmetrical encryption.

Which of the following statements is true regarding the hybrid approach to encryption?

one possesses the correct key

Cryptography takes human readable information and makes it unreadable "cipher text" which can only be read if

a unique 40-character fingerprint

Each time a key pair is created, Kleopatra generates:

Compare the decrypted file's contents with the contents of the original file

How can you verify that the integrity of encrypted files is maintained during the transmission to another user's computer?

Right-click the file and select Sign and Encrypt from the context menu

How do you encrypt a text message using the keys you created in the lab?

No because you must provide your public key to any user wanting to decrypt any message encrypted by you

If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?

Your public key

If you and another person want to encrypt messages, what should you provide that person with?

Certificate Details screen

In Kleopatra, each new certificate is created with no expiration (valid until) date, but you can set an expiration date in the:

certificates

Keys are also referred to as:

A passphrase, or password

To complete the creation of a key, what do you need to enter in the pinentry dialog box?


Set pelajaran terkait

Nclex review: Pneumonia and Respiratory Meds

View Set

La formation des questions: Posez la question qui a pour réponse l'expression soulignée. Faites les deux versions (et avec "est-ce que", et avec inversion)

View Set

Unit 9 Life insurance underwriting and policy issue

View Set

6.15 Software-Defined Network (SDN)

View Set

Chapter 5 - Antepartal Period: Psycho-Social Cultural Aspects

View Set

Macroeconomics test 2: chapters 8, 9, 10, 11, 12, 18

View Set

macro- econ 1113 exam 2 practice test

View Set

AP Micro: Chapter 4 Self-Assessment

View Set