- Out of the four methods discussed in this chapter, which two can be used to authenticate the sender?
- Symmetric algorithm
- Asymmetric algorithm
- Hash values
- Digital signatures
- When two parties need to communicate using an asymmetric algorithm, which key do they need to share?
- Private key
- Public key
- Both
- None
- Which type of algorithm is used to encrypt large amounts of data?
- Symmetric
- Asymmetric
- Both
- None
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.