1. Which of the following is a symmetric encryption algorithm?
2. What is the primary purpose of a cryptographic hash function?
3. Which of the following is an asymmetric encryption algorithm?
4. What is the key length of AES-256?
5. Which cryptographic algorithm is used for secure key exchange?
6. What is the primary purpose of a Certificate Authority (CA) in PKI?
7. What is contained in a digital certificate?
8. What is the role of a Registration Authority (RA) in PKI?
9. What is the purpose of a Certificate Revocation List (CRL)?
10. What is the primary purpose of a digital signature?
11. What is the purpose of SSL/TLS in cryptographic solutions?
12. What is the primary use of HMAC (Hash-based Message Authentication Code)?
13. Which cryptographic solution is used to securely store passwords?
14. What is the purpose of a nonce in cryptographic protocols?
15. Which cryptographic solution is used to protect data at rest?
16. What is the primary purpose of a digital certificate in PKI?
17. Which cryptographic algorithm is used for secure email communication?
18. What is the purpose of a salt in password hashing?
19. Which cryptographic solution is used to ensure non-repudiation?
20. What is the primary purpose of a key exchange protocol like Diffie-Hellman?