Register Login
Internet / AI Technology University (ITU/AITU)
Created by info@itofthefuture.com
Welcome Anonimous.User to this quiz related to Java Security.

Read the question and choose the best answer. Time is limited to 40 seconds!

Important! Do not forget to rank the quality of the question (from bad to excellent).
An initiator of the quiz will get royalty score for QnAs created by her/him and can win the Top Creativity Prize.
Question:
How keys are managed in hybrid cryptography?

It?s similar to public key cryptography
but at least one valid certificate is required to establish encrypted session



Hybrid cryptography isn?t using keys, it?s based on certificates



It?s similar to private key cryptography
but keys are available to authorized people (who know appropriate public key)



Hybrid cryptography can use both private and public keys at any stage of the session



Exchange of keys are done using public key cryptography
but following encrypted exchanged ? via private key cryptography



Exchange of keys are done using private key cryptography
but following encrypted exchanged ? via public key cryptography



Rank the Quality of the Question from "-10" (bad) or "0" (not clear) to 10 (correct) or even 20 (very good!)
-10 (bad/wrong) 0 (not clear) 10 (correct) 20 (very good!)
Your summary report will be available to you and your instructor. Thank you for your work!!!