106.
A public and private key system differs from symmetric because it uses which of the following?
- A.One key
- B.One algorithm
- C.Two keys
- D.Two algorithms
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
A public and private key are mathematically related keys, but they are not identical. In symmetric systems only one key is used at a time. |
107.
A public key is stored on the local computer by its owner in a __________.
- A.Hash
- B.PKI system
- C.Smart card
- D.Private key
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A public key is not necessarily stored on the local system, but a private key will always be present if the user is enrolled. |
108.
Symmetric key systems have key distribution problems due to __________.
- A.Number of keys
- B.Generation of key pairs
- C.Amount of data
- D.Type of data
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
The number of keys increases dramatically with more and more parties using symmetric encryption; hence it does not scale well. |
109.
What does hashing preserve in relation to data?
- A.Integrity
- B.Confidentiality
- C.Availability
- D.Repudiation
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Hashing is intended to verify and preserve the integrity of data, but it cannot preserve the confidentiality of that data. |
110.
Which of the following is a common hashing protocol?
- A.MD5
- B.AES
- C.DES
- D.RSA
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
MD5 is the most widely used hashing algorithm, followed very closely by SHA1 and the SHA family of protocols. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40