Questions

  1. Out of the four methods discussed in this chapter, which two can be used to authenticate the sender?
    1. Symmetric algorithm
    2. Asymmetric algorithm
    3. Hash values
    4. Digital signatures
  2. When two parties need to communicate using an asymmetric algorithm, which key do they need to share?
    1. Private key
    2. Public key
    3. Both
    4. None 
  3. Which type of algorithm is used to encrypt large amounts of data?
    1. Symmetric
    2. Asymmetric
    3. Both
    4. None
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.211.239