System Administrator 2026
Which of the following is not an application of symmetric encryption algorithms.
  • A. Data security
  • B. Cloud storage
  • C. User privacy
  • D. Bitcoin’s block chain
What are the two keys that are used in asymmetric key cryptography?
  • A. Secret key and private key
  • B. Private key and public key
  • C. Public key and secured key
  • D. Secured key and private key
Who are three discoverers of the RSA algorithm in public key cryptography?
  • A. Rivest, shamir, aldleman
  • B. Routest, shamir, adem
  • C. Robert, shamuel, alice
  • D. Radmir, shadhur, alice
What is the first public key cryptography algorithm?
  • A. Rsa algorithm
  • B. Aes algorithm
  • C. 3des algorithm
  • D. Knapsack algorithm
Which of the following is not a property of public key cryptography?
  • A. Uses different keys
  • B. Every user has a unique private key
  • C. Public key can be same for number of users
  • D. Cannot deduce private key from public key
What are the types in schemes of public key encryption?
  • A. Rsa, eigamal, elliptic curve cryptography
  • B. Elliptic curve, rsa
  • C. Rsa, eigamal
  • D. Eigmal, rsa
Which of the following is correct about RSA scheme in public key cryptography?
  • A. It is efficient for decryption
  • B. Lengthy keys are required for more security
  • C. It is not efficient for encryption
  • D. It is not popular
Which of the following doesn’t match as a property of elliptic curve cryptography?
  • A. Used over rsa
  • B. Uses elliptic curve theory
  • C. Key length is larger than rsa
  • D. Uses discrete logarithms