21.2.9 Check Your Understanding – Classify the Encryption Algorithms Answers

1. True or False? In asymmetric encryption, encryption and decryption use the same key.

  • True
  • False

Explanation: False. In asymmetric encryption, encryption and decryption use different keys.

2. What is an example of a symmetric encryption algorithm?

  • Internet Key Exchange (IKE)
  • Secure Socket Layer (SSL)
  • Secure Shell (SSH)
  • Advanced Encryption Standard (AES)

Explanation: Advanced Encryption Standard (AES) is a symmetric encryption standard that is widely used.

3. Which algorithm provides asymmetric encryption?

  • Data Encryption Standard (DES)
  • Diffie-Hellman (DH)
  • 3DES
  • AES

Explanation: Diffie-Hellman (DH) uses asymmetric encryption.

4. Which hash function is the most secure?

  • MD5
  • 3DES
  • IKE
  • SHA-3

Explanation: SHA-3 is the most secure of the commonly used hash functions.

Notify of

Inline Feedbacks
View all comments
Would love your thoughts, please comment.x