Sunteți pe pagina 1din 5

!

Question 1 of 15

6.0 Points

The MEL language:

!
!

A. Is part of the Multos operating system


!

B. Is used for developing applications under Java Card, being interpreted by the Java
Virtual Machine
!

C. Is used for developing applications under Multos


!

D. Is interpreted by the Application Abstract Machine (AAM)


!

Question 2 of 15

6.0 Points

Let there be an electronic money blind signature system (m) represented by the bank.
Let (d,n) be the private key of the bank and (e,n) the public key of the bank, the blind
protocol is as follows:
1. The client computes <m> = mk
2. The bankblindly sings the message <m>
3. The client computes the coin signed by the bank <m>
Which are the errors in the presented protocol?

!
!

A. reversing 1 and 3 steps


!

B. reversing 1 and 2 steps


!

C. reversing 3 and 2 steps


!

D. reversing e and d keys


!

Question 6 of 15

6.0 Points

EMV is:

!
!

A. A standard for magnetic stripe cards


!

B. A standard for intelligent cards (chip based)

**

C. A standard which defines the electric, data and application interactions


between the IC cards and IC card processing devices
!

D. A language for developing applications under Multos

Question 12 of 15

6.0 Points

The authentication in the 3-D Secure Protocol:


!

A. Uses the digital certificate of the card holder


!

B. Uses Authentication History Server in order to check the authenticity of the


card
!

C. Is done using an Access Control Server (ACS) to which the card holder has
registered

D. Is done using an Access Control Server (ACS) to which the card has
been registered during personalization
!

!!

Question 13 of 15
EMV contains, as a cryptographic facility:

A. Two card authentication methods, static and dynamic, using RSA


and EMV certificates
!

B. Optional PIN encryption


!

C. EMV transaction security by using the 3-DES algorithm


!

D. Two card authentication methods, static and dynamic, using RSA and X.509
certificates

Blind signatures:
!

A. were initially created as a protocol for securing Web applications


!

B. were theoretically created by Chaum-van Antwerpen


!

C. were theoretically created by Chaum


!

D. are used in electronic money realm

Question 15 of 15

6.0 Points

The standard ISO 7816 defines, among others, the next details of the cards:

!
!

A. Physical characteristics and dimensions


!

B. The electronic signals and transmission protocols


!

C. The specifications for the cards operating systems


!

D. JavaCard specifications for programming applications


!

Question 11 of 15

6.0 Points

About card static authentication, we can say that:


!

A. It is based on data established once and used for each


authentication
!

B. It is based on the users knowledge of the PIN


!

C. It is based on data generated randomly on each authentication


!

D. Creates vulnerabilities and simplifies the cloning process

!
!

Question 10 of 15

6.0 Points

About the iKP payment system we can say that:


!

A. 2KP adds the customer signature to 1KP


!

B. It was developed by IBM Research Labs


!

C. The number i represents the parts which hold their own public keys
!

D. 3KP adds the merchant authentication to 1KP

Question 9 of 15

6.0 Points

A multi-application smart-card may contain the following information:

!
!

A. Private Key(s) and Digital Certificates


!

B. Biometric Data
!

C. Encryption Key(s)
!

D. Single Sign-On

!!
Question 8 of 15

6.0 Points

In the eCash protocol:

!
!

A. the bank can detect the double spending of the money and who is guilty
!

B. the bank can detect the double spending of the money, but not who is guilty
!

C. a merchant can use the electronic money in order to buy from another merchant
!

D. at the end, the bank knows how much electronic money a certain client spent

!!

!!

Question 7 of 15

6.0 Points

The order number 389 /2007 of the Communications and Information Technology
Ministery (romanian MCTI) regarding the electronic payments:

A. Establishes the necessary documents for the MCTI's license for remote access
payment instruments
!

B. Establishes the scope of the MCTI's license for remote access payment
instruments
C. Establishes the structure of the security plan for remote access payment
instruments
!

D. Establishes the maximum fees for providing remote access payments


instruments services

!!
!

6.0
Points

Question 6 of 15
Mondex is:
!

A. A payment service based on smart cards and electronic coin


!

B. A payment service based on electronic cheques


!

C. A bank card which can be refilled with money from ATM


!

D. A card with a protocol that allows the exchange of coins between two smart
cards

!
!

Question 4 of 15

6.0 Points

In the Chaum blind signatures scheme, show the signing and un-blinding mechanism:
(blinding) A computes: m* = mke mod n,
A. (unblinding) A computes: s = k
B. (signing) A computes: s* = (m*)
C. (unblinding) B computes: s = k
D. (signing) B computes: s* = (m*)
!

Question 3 of 15

6.0 Points

NetCheque is:

!
!

A. A payment service based on electronic cheques that uses public key encryption (RSA)
!

B. A payment service based on electronic cheques using Kerberos


!

C. A payment service based on electronic cheques using SSL and digital certificates
!

D. A payment service based on electronic cheques that uses symmetric encryption

S-ar putea să vă placă și