1 Cryptography, cybercriminality

1.1 Cryptography, cybercriminality

1. Which of the following sentences is true?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

2. Which of the following sentences is true?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

3. When public key cryptography is used to provide confidentiality

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

4. When public key cryptography is used to provide authentication

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

5. Regarding the modes of operation of block cipher algorithms, which of the following sentences is false?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

6. Which of the following sentences is true regarding modes of operation in block cipher algorithms

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

7. The state update mechanism

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

8. Which of the following sentences is false regarding hybrid encryption:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

9. Regarding hash functions, is it false that:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

10. The digital signature must fulfil:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

11. A digital certificate

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

12. A digital certificate must be revoked when

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

13. The certification authority

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

14. Which of the following sentences is false regarding the certificate revocation list (CRL)

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

15. The use of digital certificates

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

16. In order to verify a digital signature, it is required

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

17. Regarding cybercrime, which of the following sentences is false?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

18. Examples of active attacks are:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

19. Examples of passive attacks are:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

20. Which of the following sentences is a bad prevention tip?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer