Public Key or Asymmetric Encryption

6. Which of the following do asymmetric cryptography systems provide? Select all that apply.

  • Confidentiality
  • Availability
  • Authenticity
  • Non-repudiation

7. What advantage does asymmetric encryption have over symmetric encryption?

  • They have very fast performance.
  • They allow secure communication over untrusted channels.
  • They’re more secure.
  • They’re easier to implement.

8. What's a common application for asymmetric algorithms?

  • Full disk encryption
  • Secure password storage
  • Secure key exchange
  • Random number generation

9. What do we call a bit of information that allows authentication of a received message?

  • Asymmetric encryption
  • RSA
  • Symmetric encryption
  • MAC (Message Authentication Codes)

10. Which form of encryption does the US NEST recommend?

  • NSA
  • DSA
  • EC
  • DH

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply