Question:
Which two statements describe the use of asymmetric algorithms? (Choose two.)
- Public and private keys may be used interchangeably.
- If a public key is used to encrypt the data, a public key must be used to decrypt the data.
- If a private key is used to encrypt the data, a public key must be used to decrypt the data.
- If a public key is used to encrypt the data, a private key must be used to decrypt the data.
- If a private key is used to encrypt the data, a private key must be used to decrypt the data.
Explanation: Asymmetric algorithms use two keys: a public key and a private key. Both keys are capable of the encryption process, but the complementary matched key is required for decryption. If a public key encrypts the data, the matching private key decrypts the data. The opposite is also true. If a private key encrypts the data, the corresponding public key decrypts the data.
Exam with this question: CCNA Cyber Ops Practice Final Exam Answers
Exam with this question: CCNA 3 v7 Course Final Exam Answers
Exam with this question: CyberOps Associate Course Final Exam Answers
Exam with this question: CCNA Security Practice Final Exam Answers
Exam with this question: Network Security 1.0 Final Exam Answers
Please login or Register to submit your answer