|Disclaimer: The purpose of these questions is to review the content of todays lecture. The questions have been posted by students from the course and are not entirely reviewed.|
Responsible for today's questions are:
|Team 16||Sven Ahlheid, Michael Diekmann, Dagmar Kohlhaas|
|Team 17||Christoph Morawiecki, Jan-Florens Raschke, Conny Schmidt|
|Team 18||David Poetter, Jan Spallek, Mel Meier|
Question 1: 5.5 Security Architectures
Which of the following statements about encryption are correct?
A) A mail is encrypted with the public key of the recipient.
B) A mail is encrypted with the private key of the sender.
C) A mail is decrypted with the public key of the sender.
D) A mail is decrypted with the private key of the sender.
Question 2: 5.6 Security Architectures
Karl wants to be sure that the mail he received from Paula has not been altered during the transfer. Additionally, he wants to make sure that the mail has really been sent by Paula, and not by a person impersonating her. Which mechanism lets Karl verify identity and original content.
A) Paula can sign the mail using her private key to create an electronic signature.
B) Paula can sign the mail with her first and last name.
C) Paula can ask for a delivery confirmation after Karl received the mail.
D) Karl can request a delivery confirmation from the Paula after he received the mail.
Question 3: 5.7 Security Architectures
Which of the following statements about the public/private key infrastructure in a Notes/Domino environment are correct?.
A) The Domino Directory contains information about every registered Notes user of the organisation. That includes the public key of the user.
B) The private key of a user is included in his/her Notes ID.
C) The Domino Directory contains information about every registered Notes user of the organisation. That includes the private key of the user.
D) The username is part of the private key of every user.
Question 4: 5.8 Security Architectures
Which of the following statements about electronic signatures in a Notes/Domino environment are correct?.
A) Electronic signatures are based upon a symmetric encryption algorithm (Secret Encryption Key)
B) Electronic signatures are based upon an asymmetric encryption algorithm (public/private key, RSA).
C) An electronic signature can be used to sign sections of a document or a Email.
D) Electronic signatures can exclusively be used to signing EMails.
Question 5: 5.9 Security Architectures
Fill in the blank in the following sentence about mail security:
Dr. No is an evil criminal subject that tries to read confidential information contained in an EMail. You can prevent Dr. No from reading the content of your mail by using
to secure your mail.
Question 6: 5.12 Security Architectures
The Notes ID
Which of the following statements about the Lotus Notes user ID are correct?
A) The Notes ID is protected with a password.
B) The Notes ID stores certificates to authenticate the user with a Domino server.
C) The Notes ID stores certificates to authorize the user with a Domino server.
D) The Notes ID stores an electronic signature of the user to sign EMails.
Question 7: 5.13 Security Architectures
Which are popular techniques to authenticate a user with a server?
A) Username and Password.
B) Secret encryption key.
C) Digital certificates.
D) None of the above.
Question 8: 5.14 Security Architectures
Documents can be encrypted using a secret encryption key. Which of the following statements about secret encryption keys are correct?
A) A secret encryption key uses a public key to encrypt and a private key to decrypt data.
B) Secret encryption key security depends on the fact that only the author and potential readers share the secret encryption key.
C) A single secret encryption key is used to encrypt and decrypt data.
D) A secret encryption key can only be used in a Lotus Notes environment.
Question 9: 5.15 Security Architectures
An electronic signature...
A) offers strong proof that a document is genuine and faithful.
B) in the Notes/Domino environment includes atechnique that provides a unique fingerprint of a document in its original form which is created by a mathematical algorithm, a so-called hash function.
C) is used to assure that a sensitive documents originator can be verified.
D) is a complex mathematical function used to encrypt and decrypt private information.
Question 10: 5.16 Security Architectures
Securing the workstation is very important. You have seen how both the Notes Client and the Web client authenticate with the server. Besides, there are additional workstation-related security features. Check all security features offered by the Notes Client.
A) Execution Control List.
B) User ID and password.
C) Client side port encryption.
D) SSL Client encryption.