In which situation is an asymmetric key algorithm used?

IT Questions BankCategory: CCNA CyberOpsIn which situation is an asymmetric key algorithm used?

In which situation is an asymmetric key algorithm used?

  • An office manager encrypts confidential files before saving them to a removable device.
  • Two Cisco routers authenticate each other with CHAP.
  • User data is transmitted across the network after a VPN is established.
  • A network administrator connects to a Cisco router with SSH.

Explanation: The SSH protocol uses an asymmetric key algorithm to authenticate users and encrypt data transmitted. The SSH server generates a pair of public/private keys for the connections. Encrypting files before saving them to a storage device uses a symmetric key algorithm because the same key is used to encrypt and decrypt files. The router authentication with CHAP uses a symmetric key algorithm. The key is pre-configured by the network administrator. A VPN may use both an asymmetric key and a symmetric encryption algorithm. For example in an IPSec VPN implementation, the data transmission uses a shared secret (generated with an asymmetric key algorithm) with a symmetric encryption algorithm used for performance.

Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: CCNA Security Chapter 7 Exam Answers
Exam with this question: CCNA Security Chapter 7 Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments