Ecommerce Security  «Prev  Next»

Digital Signature Authentication - Quiz

Each question is worth one point. Select the best answer or answers for each question.

1. What does authentication mean in digital security?
Please select the best answer.
  A. That the merchant has an authentic physical storefront to accompany his or her Web business
  B. That someone is who he or she claims to be
  C. That the data sent over the Internet is accurate
  D. That the customer has a valid bank account to pay for his or her purchase

2. How is authentication implemented?
Please select the best answer.
  A. By tracing email addresses of the parties involved
  B. By using a process called digital enveloping
  C. By using a process called digital signatures
  D. By using passwords to control access to Web sites

3. For what purpose are ciphers used?
Please select the best answer.
  A. For authenticating parties in an e-commerce transaction
  B. For encrypting and decrypting plaintext messages
  C. For verifying that credit card account numbers are valid
  D. For ensuring that customers' shipping addresses are valid

4. What is a certificate authority?
Please select all the correct answers.
  A. An organization that guarantees that an e-commerce merchant is legitimate
  B. A company that validates customers' bank balances before e-commerce transactions are completed
  C. A trusted third party that issues certificates
  D. An organization guaranteeing that a specific public key is associated with the named user

5. In cryptography, key length affects key strength by:
Please select the best answer.
  A. Multiplying the strength by two for each bit added to the key length
  B. Exponentially increasing the encryption strength for each bit added to the key length
  C. Tripling the possible algorithms available for each bit added to the key length
  D. Increasing the secrecy of the key for each bit added to the key length

6. What constitutes "strong encryption"?
Please select all the correct answers.
  A. The uses of data confidentiality, participant authentication, data security, and data integrity
  B. The use of public-key encryption, firewalls, passwords, and authorization codes
  C. The secrecy of the key, the length of the algorithm, and the length of the key
  D. The use of multiple types of encryption to minimize their weaknesses and maximize their strengths