Home
You may like this!
11.
Symmetric cryptography is also known as __________.
  • A.
    Shared key cryptography
  • B.
    Public key cryptography
  • C.
    Hashing
  • D.
    Steganography
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Symmetric cryptography is also known as shared key cryptography.
Report
Name Email  
12.
Which of the following manages digital certificates?
  • A.
    Hub
  • B.
    Key
  • C.
    Public key
  • D.
    Certificate authority
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A certificate authority is responsible for issuing and managing digital certificates as well as keys.
Report
Name Email  
13.
Asymmetric encryption is also referred to as which of the following?
  • A.
    Shared key
  • B.
    Public key
  • C.
    Hashing
  • D.
    Block
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Asymmetric encryption uses two separate keys and is referred to as public key cryptography. Symmetric algorithms use only one key that is used by both the sender and receiver.
Report
Name Email  
14.
Which of the following best describes hashing?
  • A.
    An algorithm
  • B.
    A cipher
  • C.
    Nonreversible
  • D.
    A cryptosystem
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Hashing is referred to as a cipher or algorithm or even a cryptosystem, but it can be uniquely referred to as a nonreversible mechanism for verifying the integrity of data. Remember that hashing doesn’t enforce confidentiality.
Report
Name Email  
15.
A message digest is a product of which kind of algorithm?
  • A.
    Symmetric
  • B.
    Asymmetric
  • C.
    Hashing
  • D.
    Steganography
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A message digest is a product of a hashing algorithm, which may also be called a message digest function.
Report
Name Email