1: An asymmetric-key (or public-key) cipher uses
2: The cryptography algorithms (ciphers) are divided into
3: If 10 people needs to communicate securely with each other, how many number of secret keys will be required? (Secret Key Cryptography)
4: Which is the largest disadvantage of the symmetric Encryption?
5: Which of the following is not a principle of data security?
6: If 10 people needs to communicate securely with each other, how many number of keys will be required? (Public Key Cryptography)
7: Using asymmetric encryption, Alice uses which key to send a message to Bob:
8: Which of the following is not possible through hash value?
9: Using asymmetric encryption, Alice uses which key to open a message received from Bob
10: Which of the following is not a property of Hash Function?