A) verification of the sender
B) prevention of the sender from disowning the message
C) prove the integrity of the message
D) protect the public key
Correct Answer
verified
Multiple Choice
A) symmetric
B) asymmetric
C) shared
D) open
Correct Answer
verified
Multiple Choice
A) AES
B) RSA
C) Twofish
D) Blowfish
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) ephemeral-secrecy
B) perfect forward secrecy
C) public secrecy
D) random-key exchange
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Quantum Prime
B) Prime-Curve
C) Diffie-Hellman
D) Elliptic Curve Diffie-Hellman
Correct Answer
verified
Multiple Choice
A) SHA-384
B) HMAC
C) RIPEMD
D) MD5
Correct Answer
verified
Multiple Choice
A) 32 bits
B) 64 bits
C) 128 bits
D) 512 bits
Correct Answer
verified
Multiple Choice
A) hardware encryption
B) private encryption
C) application encryption
D) full disk encryption
Correct Answer
verified
Showing 41 - 50 of 50
Related Exams