1. True or False? In asymmetric encryption, encryption and decryption use the same key.
__. What is an example of a symmetric encryption algorithm?
- Internet Key Exchange (IKE)
- Secure Socket Layer (SSL)
- Secure Shell (SSH)
- Advanced Encryption Standard (AES)
2. Which algorithm provides asymmetric encryption?
- Data Encryption Standard (DES)
- Diffie-Hellman (DH)
3. Which hash function is the most secure?