In what situation would an asymmetric algorithm most likely be used?
- logging onto a computer
- making an online purchase
- uploading a networking book chapter using FTP
- transferring a large stream of data between two corporate locations
Explanation: Asymmetric algorithms are slow, so they are commonly used in low-volume transactions such as making online purchases or logging into a financial website.
Exam with this question: CCNA Security Chapter 7 Exam Answers
Please login or Register to submit your answer