Activity 4.3 - Identify Symmetrical And Asymmetrical Encryption

6 Questions | Total Attempts: 361

SettingsSettingsSettings
Activity 4.3 - Identify Symmetrical And Asymmetrical Encryption - Quiz

Based on the description given, select the most appropriate type of encryption.


Questions and Answers
  • 1. 
    Share a common key for encryption and decryption.
    • A. 

      Symmetrical

    • B. 

      Asymmetrical

  • 2. 
    Faster and uses less processing resources.
    • A. 

      Symmetrical

    • B. 

      Asymmetrical

  • 3. 
    Key management can be a issue as the number of users increases.
    • A. 

      Symmetrical

    • B. 

      Asymmetrical

  • 4. 
    Uses RSA (Rivest-Shamir-Adleman).
    • A. 

      Symmetrical

    • B. 

      Asymmetrical

  • 5. 
    Used by applications like IKE, SSH, PGP and SSL.
    • A. 

      Symmetrical

    • B. 

      Asymmetrical

  • 6. 
    Use a public key to encrypt and private key to decrypt.
    • A. 

      Symmetrical

    • B. 

      Asymmetrical

Back to Top Back to top