6. Which of the following do asymmetric cryptography systems provide? Select all that apply.
- Confidentiality
- Availability
- Authenticity
- Non-repudiation
7. What advantage does asymmetric encryption have over symmetric encryption?
- They have very fast performance.
- They allow secure communication over untrusted channels.
- They’re more secure.
- They’re easier to implement.
8. What's a common application for asymmetric algorithms?
- Full disk encryption
- Secure password storage
- Secure key exchange
- Random number generation
9. What do we call a bit of information that allows authentication of a received message?
- Asymmetric encryption
- RSA
- Symmetric encryption
- MAC (Message Authentication Codes)