1. True or False? In asymmetric encryption, encryption and decryption use the same key.
- True
- False
2. What is an example of a symmetric encryption algorithm?
- Internet Key Exchange (IKE)
- Secure Socket Layer (SSL)
- Secure Shell (SSH)
- Advanced Encryption Standard (AES)
3. Which algorithm provides asymmetric encryption?
- Data Encryption Standard (DES)
- Diffie-Hellman (DH)
- 3DES
- AES
4. Which hash function is the most secure?
- MD5
- 3DES
- IKE
- SHA-3