Preview

12 - Digital Certificates and Signatures

 1. Digital ………………………are used in conjunction with public key cryptography.

  bits

  bytes

  corrections

  signatures

 2. Public key cryptography always ensures that that the data is secure and it guarantees that the message that has been sent is not modified at all.

  TRUE

  FALSE

 3. A digital signature stops a message from being tampered with.

  FALSE

  TRUE

 4. A digital signature allows a recipient of a message to know who the sender of the message is and whether the message has been tampered with.

  FALSE

  TRUE

 5. A digital signature is generated by….

  printing the document directly

  None of the above

  encrypting the document and then deleting it

  analysing the document and formalising it in a mathematical notation.

 6. In the mathematical notation used by a digital signature a …………… function acts on the data and generates a unique …………….code which depends on the content of the message.

  digital

  hash

  mash

  dash

 7. If any of the contents of the message change, then ……

  the hash code will match the security document and delete it

  the hash code will not match the document and show it has been tampered with

  the hash code will delete the document immediately

  None of the above

 8. Digital signatures are also used on the web where programmers sign their applications which shows that a specific application is safe and virus-free.

  FALSE

  TRUE

 9. A digital certificate is an ………………to an encrypted message that is used to show the message is from a certified, and, so, trusted source.
When using asymmetric encryption, the recipient can view the digital certificate attached, establish that the message is from  trusted sources and use their associated private key to decrypt the message.

  TRUE

  FALSE

 10. Digital signatures is a method used to determine the authenticity of a message source by checking an encrypted and certified digitial signature.

  TRUE

  FALSE