Home
You may like this!
106.
A public and private key system differs from symmetric because it uses which of the following?
  • A.
    One key
  • B.
    One algorithm
  • C.
    Two keys
  • D.
    Two algorithms
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A public and private key are mathematically related keys, but they are not identical. In symmetric systems only one key is used at a time.
Report
Name Email  
107.
A public key is stored on the local computer by its owner in a __________.
  • A.
    Hash
  • B.
    PKI system
  • C.
    Smart card
  • D.
    Private key
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A public key is not necessarily stored on the local system, but a private key will always be present if the user is enrolled.
Report
Name Email  
108.
Symmetric key systems have key distribution problems due to __________.
  • A.
    Number of keys
  • B.
    Generation of key pairs
  • C.
    Amount of data
  • D.
    Type of data
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
The number of keys increases dramatically with more and more parties using symmetric encryption; hence it does not scale well.
Report
Name Email  
109.
What does hashing preserve in relation to data?
  • A.
    Integrity
  • B.
    Confidentiality
  • C.
    Availability
  • D.
    Repudiation
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Hashing is intended to verify and preserve the integrity of data, but it cannot preserve the confidentiality of that data.
Report
Name Email  
110.
Which of the following is a common hashing protocol?
  • A.
    MD5
  • B.
    AES
  • C.
    DES
  • D.
    RSA
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
MD5 is the most widely used hashing algorithm, followed very closely by SHA1 and the SHA family of protocols.
Report
Name Email