Multiple Choice
Match the following terms to the appropriate definitions
-Data that has been encrypted.
A) Advanced Encryption Standard (AES)
B) Block cipher
C) Ciphertext
D) Data Encryption Standard (DES)
E) Diffie-Hellman (DH)
F) Elliptic curve cryptography (ECC)
G) Ephemeral key
H) Private key
I) Public key
J) Stream cipher
Correct Answer:

Verified
Correct Answer:
Verified
Q14: The SHA-1 hashing algorithm creates a digest
Q26: Match the following terms to the appropriate
Q27: Which of the following is not one
Q28: Match the following terms to the appropriate
Q29: A key that is generated by a
Q31: The asymmetric cryptography algorithm most commonly used
Q31: What cryptographic method,first proposed in the mid-1980s,makes
Q32: A(n) _ is a method used by
Q34: In information technology, _ is the process
Q45: If using the MD5 hashing algorithm,what is