A SOHO office is using a public cloud provider to host their website. The IT technician is choosing an approach to protect transaction data between the website and visitors from the internet. Which type of encryption key management method should the technician choose?

IT Questions BankCategory: Network DefenseA SOHO office is using a public cloud provider to host their website. The IT technician is choosing an approach to protect transaction data between the website and visitors from the internet. Which type of encryption key management method should the technician choose?

A SOHO office is using a public cloud provider to host their website. The IT technician is choosing an approach to protect transaction data between the website and visitors from the internet. Which type of encryption key management method should the technician choose?

  • public key encryption
  • private key encryption
  • secret key encryption
  • shared-secret key encryption

Explanation: The two classes of encryption approaches are symmetric and asymmetric encryption. Symmetric encryption algorithms use the same key, called pre-shared key or shared-secret key, to encrypt and decrypt data. Asymmetric encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. Asymmetric encryption is also called public key encryption. In this scenario, web visitors are unknown therefore public key encryption should be used.

Exam with this question: Network Defense (NetDef) Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x