1. What are two hash algorithms?
- ECC
- RSA
- MD5
- SHA
- RC4
2. What are two asymmetric encryption algorithms? (Choose two.)
- ECC
- RSA
- SHA
- AES
3. Which state of data refers to data during initial input, modification, computation, or output.
- Data at transmit
- Data at progress
- Data at rest
- Data at process
4. Which algorithm is used in symmetric encryption operation?
- SHA
- diffie-Hellman
- RSA
- AES