This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions below.
How many keys are required when using symmetric encryption?
Three.
One.
Two.
When using asymmetric encryption, which key shouldn't be shared?
Private key.
Public key.
Key pair.
What is a hashing function?
A hashing function is an algorithm that creates a new ciphertext message from the plaintext.
A hashing function is an algorithm that's used to decrypt ciphertext from the sender.
A hashing function is an algorithm that creates a fixed-length hexadecimal value of the plaintext.
You must answer all questions before checking your work.
Was this page helpful?