GCC Teaching: 052445 LOG eSpace Concepts 1. LOG of the course, Groupware Competence Center, Paderborn 2002.

Log of the course eSpace Concepts 1

THEMES: GCC Teaching\Lecture 2002/0...
META STRUCTURES: GCC Activities\...\Lectures | GCC Teaching\Lecture 2002/0... | IE\Vorlesungen | Projects\...\Lectures | Projects\...\Lectures
YEAR: 2002
Login Login
User: Anonymous


PLACES: Paderborn
TIME: 2002
 
16.12.
Sample Questions
Disclaimer: The purpose of these questions is to review the content of todays lecture. The questions have been posted by students from the course and are not entirely reviewed.

Responsible for today's questions are:

Team Number
Student Names
Team 16Sven Ahlheid, Michael Diekmann, Dagmar Kohlhaas
Team 17Christoph Morawiecki, Jan-Florens Raschke, Conny Schmidt
Team 18David Poetter, Jan Spallek, Mel Meier

Question 1: 5.5 Security Architectures

Encryption

Which of the following statements about encryption are correct?

A) A mail is encrypted with the public key of the recipient.

B) A mail is encrypted with the private key of the sender.

C) A mail is decrypted with the public key of the sender.

D) A mail is decrypted with the private key of the sender.




Question 2: 5.6 Security Architectures

Mail security

Karl wants to be sure that the mail he received from Paula has not been altered during the transfer. Additionally, he wants to make sure that the mail has really been sent by Paula, and not by a person impersonating her. Which mechanism lets Karl verify identity and original content.

A) Paula can sign the mail using her private key to create an electronic signature.

B) Paula can sign the mail with her first and last name.

C) Paula can ask for a delivery confirmation after Karl received the mail.

D) Karl can request a delivery confirmation from the Paula after he received the mail.




Question 3: 5.7 Security Architectures

Mail security

Which of the following statements about the public/private key infrastructure in a Notes/Domino environment are correct?.

A) The Domino Directory contains information about every registered Notes user of the organisation. That includes the public key of the user.

B) The private key of a user is included in his/her Notes ID.

C) The Domino Directory contains information about every registered Notes user of the organisation. That includes the private key of the user.

D) The username is part of the private key of every user.




Question 4: 5.8 Security Architectures

Mail security

Which of the following statements about electronic signatures in a Notes/Domino environment are correct?.

A) Electronic signatures are based upon a symmetric encryption algorithm (Secret Encryption Key)

B) Electronic signatures are based upon an asymmetric encryption algorithm (public/private key, RSA).

C) An electronic signature can be used to sign sections of a document or a Email.

D) Electronic signatures can exclusively be used to signing EMails.




Question 5: 5.9 Security Architectures

Mail security

Fill in the blank in the following sentence about mail security:

Dr. No is an evil criminal subject that tries to read confidential information contained in an EMail. You can prevent Dr. No from reading the content of your mail by using

.................................................

to secure your mail.




Question 6: 5.12 Security Architectures

The Notes ID

Which of the following statements about the Lotus Notes user ID are correct?

A) The Notes ID is protected with a password.

B) The Notes ID stores certificates to authenticate the user with a Domino server.

C) The Notes ID stores certificates to authorize the user with a Domino server.

D) The Notes ID stores an electronic signature of the user to sign EMails.




Question 7: 5.13 Security Architectures

Authentication

Which are popular techniques to authenticate a user with a server?

A) Username and Password.

B) Secret encryption key.

C) Digital certificates.

D) None of the above.




Question 8: 5.14 Security Architectures

Encryption

Documents can be encrypted using a secret encryption key. Which of the following statements about secret encryption keys are correct?

A) A secret encryption key uses a public key to encrypt and a private key to decrypt data.

B) Secret encryption key security depends on the fact that only the author and potential readers share the secret encryption key.

C) A single secret encryption key is used to encrypt and decrypt data.

D) A secret encryption key can only be used in a Lotus Notes environment.




Question 9: 5.15 Security Architectures

Electronic signatures

An electronic signature...

A) offers strong proof that a document is genuine and faithful.

B) in the Notes/Domino environment includes atechnique that provides a unique fingerprint of a document in its original form which is created by a mathematical algorithm, a so-called hash function.

C) is used to assure that a sensitive documents originator can be verified.

D) is a complex mathematical function used to encrypt and decrypt private information.




Question 10: 5.16 Security Architectures

Workstation security

Securing the workstation is very important. You have seen how both the Notes Client and the Web client authenticate with the server. Besides, there are additional workstation-related security features. Check all security features offered by the Notes Client.

A) Execution Control List.

B) User ID and password.

C) Client side port encryption.

D) SSL Client encryption.