A security technician uses an asymmetric algorithm to encrypt messages with a private key and then forwards that data to another technician. What key must be used to decrypt this data?
- The public key of the receiver.
- The public key of the sender.
- The private key of the receiver.
- The private key of the sender.
Explanation: Asymmetric algorithms use two keys. if a public key encrypts the data, the matching private key decrypts the data. The opposite is also true. If a private key encrypts the data, the corresponding public key decrypts the data.
Exam with this question: CCNA Security Practice Final Exam Answers
Exam with this question: CCNA Security Certification Practice Exam Answers
Please login or Register to submit your answer