What is used to decrypt data that has been encrypted using an asymmetric encryption algorithm public key?

IT Questions BankCategory: CCNA 3 v7What is used to decrypt data that has been encrypted using an asymmetric encryption algorithm public key?

What is used to decrypt data that has been encrypted using an asymmetric encryption algorithm public key?

  • A different public key
  • A digital certificate
  • A private key
  • DH

Explanation: When an asymmetric algorithm is used, public and private keys are used for the encryption. Either key can be used for encryption, but the complementary matched key must be used for the decryption. For example, if the public key is used for encryption, the private key must be used for the decryption.

Exam with this question: 3.11.3 Module Quiz - Network Security Concepts

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments