FISS Lab 7 Assessment
When the key is successfully created, which of the following options lets you store your certificate on a public Internet server? a. Make a Backup Of Your Key Pair b. Upload Certificate to Directory Service c. Save Your Key Pair d. Send Certificate by Email
Upload Certificate to Directory Service
What must you do to any certificate imported into Kleopatra before you can use it to decrypt messages? a. Change the trust level b. Link it to your public key c. Save it d. Link it to your private key
Change the trust level
How can you verify that the integrity of encrypted files is maintained during the transmission to another user's computer? a. Import the file into KIeopatra and select the Integrity Check option. b.Right-click the file and select Verify from the context menu. c. Right-click the file and select Integrity Check from the context menu. d. Compare the decrypted file's contents with the contents of the original file.
Compare the decrypted file's contents with the contents of the original file.
Which of the following statements is true regarding the hybrid approach to encryption? a. It provides the same full CIA protection as asymmetrical encryption with nearly the same speed as symmetrical encryption. b. The sender sends the message and a copy of the asymmetric key using the sender's symmetric private key. c. The initial message and asymmetric key are decrypted using the sender's private key. d. The sender encrypts the message with an asymmetric key.
It provides the same full CIA protection as asymmetrical encryption with nearly the same speed as symmetrical encryption.
What is the certificate management component of GPG4Win? a. Windows Manager b. Kleopatra c. FileZilla d. Digital Signature Algorithm (DSA)
Kleopatra
When the key is successfully created, which of the following options sends a copy of your private key to your computer? a. Upload Certificate to Directory Service b. Send Certificate by EMail c. Make a Backup Of Your Key Pair d. Save Your Key Pair
Make a Backup Of Your Key Pair
If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him? a. Only if he also sends you his private key. b. No because you must provide your public key to any user wanting to decrypt any message encrypted by you. c. No because you must provide your private key to any user wanting to decrypt any message encrypted by you. d. Yes because his public key is used by both of you to encrypt and decrypt messages.
No because you must provide your public key to any user wanting to decrypt any message encrypted by you.
Which of the following statements is true regarding aymmetrical encryption? a. The sender encrypts with his/her public key and the receiver decrypts using the sender's private key. b. It is quite fast and generally easier to implement than symmetric cryptography. c. The receiver obtains the needed key from the sender or through a trusted third party, such as certificate server. d. It does not guarantee the authenticity of the sender.
The receiver obtains the needed key from the sender or through a trusted third party, such as certificate server.
Which of the following statements is true regarding symmetric cryptography? a. The sender and receiver use the same key to encrypt and decrypt a given message. b. It is quite slow and generally more difficult to implement than asymmetric cryptography. c. It guarantees authenticity. d. It does not provide confidentiality or integrity.
The sender and receiver use the same key to encrypt and decrypt a given message.
Each time a key pair is created, Kleopatra generates: a. a test b. a unique 40-character fingerprint c. an expiration date d. a unique 8-digit fingerprint
unique 40-character fingerprint