1. True or False? In asymmetric encryption, encryption and decryption use the same key.
2. What is an example of a symmetric encryption algorithm?
- Internet Key Exchange (IKE)
- Secure Socket Layer (SSL)
- Secure Shell (SSH)
- Advanced Encryption Standard (AES)
3. Which algorithm provides asymmetric encryption?
- Data Encryption Standard (DES)
- Diffie-Hellman (DH)
4. Which hash function is the most secure?