Preview

12 - Digital Certificates and Signatures

 1. Digital ………………………are used in conjunction with public key cryptography.

  bytes

  bits

  signatures

  corrections

 2. Public key cryptography always ensures that that the data is secure and it guarantees that the message that has been sent is not modified at all.

  FALSE

  TRUE

 3. A digital signature stops a message from being tampered with.

  TRUE

  FALSE

 4. A digital signature allows a recipient of a message to know who the sender of the message is and whether the message has been tampered with.

  FALSE

  TRUE

 5. A digital signature is generated by….

  analysing the document and formalising it in a mathematical notation.

  encrypting the document and then deleting it

  printing the document directly

  None of the above

 6. In the mathematical notation used by a digital signature a …………… function acts on the data and generates a unique …………….code which depends on the content of the message.

  digital

  hash

  mash

  dash

 7. If any of the contents of the message change, then ……

  the hash code will delete the document immediately

  the hash code will match the security document and delete it

  the hash code will not match the document and show it has been tampered with

  None of the above

 8. Digital signatures are also used on the web where programmers sign their applications which shows that a specific application is safe and virus-free.

  FALSE

  TRUE

 9. A digital certificate is an ………………to an encrypted message that is used to show the message is from a certified, and, so, trusted source.
When using asymmetric encryption, the recipient can view the digital certificate attached, establish that the message is from  trusted sources and use their associated private key to decrypt the message.

  FALSE

  TRUE

 10. Digital signatures is a method used to determine the authenticity of a message source by checking an encrypted and certified digitial signature.

  FALSE

  TRUE