Public Key or Asymmetric Encryption Post author:Devendra Kumar Post published: Post comments:0 Comments 6. Which of the following do asymmetric cryptography systems provide? Select all that apply. Answers ConfidentialityAvailabilityAuthenticityNon-repudiation 7. What advantage does asymmetric encryption have over symmetric encryption? Answers They have very fast performance.They allow secure communication over untrusted channels.They’re more secure.They’re easier to implement. 8. What's a common application for asymmetric algorithms? Answers Full disk encryptionSecure password storageSecure key exchangeRandom number generation 9. What do we call a bit of information that allows authentication of a received message? Answers Asymmetric encryptionRSASymmetric encryptionMAC (Message Authentication Codes) 10. Which form of encryption does the US NEST recommend? Answers NSADSAECDH Previous Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Week 3 – Listening and engagement on social media – Shuffle Q/A 4 Practice Quiz: Managing Our Time Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.