7.5.4 Check Your Understanding: Cloud Data Security

1. What are two hash algorithms?

  • ECC
  • RSA
  • MD5
  • SHA
  • RC4

Explanation: MD5 and SHA are two common hash algorithms. However, MD5 is no longer considered secure.

2. What are two asymmetric encryption algorithms? (Choose two.)

  • ECC
  • RSA
  • SHA
  • AES

Explanation: Rivest-Shamir-Adleman (RSA) and Elliptic curve cryptography (ECC) are two asymmetric encryption algorithms.

3. Which state of data refers to data during initial input, modification, computation, or output.

  • Data at transmit
  • Data at progress
  • Data at rest
  • Data at process

Explanation: Data in Process refers to data during initial input, modification, computation, or output

4. Which algorithm is used in symmetric encryption operation?

  • SHA
  • diffie-Hellman
  • RSA
  • AES

Explanation: The Advanced Encryption Standard (AES) is a symmetric encryption algorithm.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments