In which situation is an asymmetric key algorithm used?
- An office manager encrypts confidential files before saving them to a removable device.
- Two Cisco routers authenticate each other with CHAP.
- User data is transmitted across the network after a VPN is established.
- A network administrator connects to a Cisco router with SSH.
Explanation: The SSH protocol uses an asymmetric key algorithm to authenticate users and encrypt data transmitted. The SSH server generates a pair of public/private keys for the connections. Encrypting files before saving them to a storage device uses a symmetric key algorithm because the same key is used to encrypt and decrypt files. The router authentication with CHAP uses a symmetric key algorithm. The key is pre-configured by the network administrator. A VPN may use both an asymmetric key and a symmetric encryption algorithm. For example in an IPSec VPN implementation, the data transmission uses a shared secret (generated with an asymmetric key algorithm) with a symmetric encryption algorithm used for performance.
Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: CCNA Security Chapter 7 Exam Answers
Exam with this question: CCNA Security Chapter 7 Exam (CCNAS v1.2)
Please login or Register to submit your answer