If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

IT Questions BankIf an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

  • a digital certificate
  • a different public key
  • a private key
  • DH

Explanation: When an asymmetric algorithm is used, public and private keys are used for the encryption. Either key can be used for encryption, but the complementary matched key must be used for the decryption. For example if the public key is used for encryption, then the private key must be used for the decryption.

Exam with this question: CCNA 3 v7 Modules 3 – 5 Exam Answers
Exam with this question: CCNA Cyber Ops Chapter 9 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x