Computer Security and Reliability Questions
Explore questions in the Computer Security and Reliability category that you can ask Spark.E!
Which asymmetric encryption algorithm is often used for secure email communication?a) RSA (Rivest-Shamir-Adleman)b) ECC (Elliptic Curve Cryptography)c) DH (Diffie-Hellman)d) AES (Advanced Encryption Standard)
What is the primary purpose of a hashing in information security?a) Encrypting sensitive datab) Ensuring data integrityc) Hiding data from unauthorized usersd) Securing network communications
Which of the following best describes symmetric encryption?a) It uses two different keys for encryption and decryption.b) It uses the same key for both encryption and decryption.c) It is more secure than asymmetric encryption.d) It is primarily used for digital signatures.
Which key is kept secret in asymmetric encryption?a) Public Keyb) Private Keyc) Both Public and Private Keysd) None of the above
In asymmetric encryption, which key is used for encryption?a) Public Keyb) Private Keyc) Both Public and Private Keysd) None of the above
In asymmetric encryption, what is the primary purpose of the private key?a) Encrypt data for secure transmissionb) Decrypt data received from othersc) Share with anyone for secure communicationd) Generate random numbers
What is the primary advantage of asymmetric encryption over symmetric encryption?a) Faster encryption and decryptionb) Simplicity in key managementc) Stronger security for key distributiond) Smaller key sizes
Which symmetric encryption mode ensures that the same plaintext block encrypted multiple times with the same key will produce different ciphertexts?a) ECB (Electronic Codebook)b) CBC (Cipher Block Chaining)c) CFB (Cipher Feedback)d) OFB (Output Feedback)
What is the main disadvantage of asymmetric encryption compared to symmetric encryption?a) Slower encryption and decryptionb) Complexity in key managementc) Limited use for digital signaturesd) Inability to protect data during transmission
Which of the following asymmetric encryption algorithms is widely used for secure communications on the Internet?a) AES (Advanced Encryption Standard)b) RSA (Rivest-Shamir-Adleman)c) DES (Data Encryption Standard)d) Blowfish
Which of the following is NOT a symmetric encryption algorithm?a) AES (Advanced Encryption Standard)b) RSA (Rivest-Shamir-Adleman)c) DES (Data Encryption Standard)d) 3DES (Triple Data Encryption Standard)