11.
Symmetric cryptography is also known as __________.
- A.Shared key cryptography
- B.Public key cryptography
- C.Hashing
- D.Steganography
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Symmetric cryptography is also known as shared key cryptography. |
12.
Which of the following manages digital certificates?
- A.Hub
- B.Key
- C.Public key
- D.Certificate authority
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A certificate authority is responsible for issuing and managing digital certificates as well as keys. |
13.
Asymmetric encryption is also referred to as which of the following?
- A.Shared key
- B.Public key
- C.Hashing
- D.Block
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Asymmetric encryption uses two separate keys and is referred to as public key cryptography. Symmetric algorithms use only one key that is used by both the sender and receiver. |
14.
Which of the following best describes hashing?
- A.An algorithm
- B.A cipher
- C.Nonreversible
- D.A cryptosystem
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Hashing is referred to as a cipher or algorithm or even a cryptosystem, but it can be uniquely referred to as a nonreversible mechanism for verifying the integrity of data. Remember that hashing doesn’t enforce confidentiality. |
15.
A message digest is a product of which kind of algorithm?
- A.Symmetric
- B.Asymmetric
- C.Hashing
- D.Steganography
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
A message digest is a product of a hashing algorithm, which may also be called a message digest function. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40