When using public key encryption to secure data being
transmitted across a network:

A. both the key used to encrypt and decrypt the data are public.

B. the key used to encrypt is private, but the key used to
decrypt the data is public.

C. the key used to encrypt is public, but the key used to
decrypt the data is private.

D. both the key used to encrypt and decrypt the data are
private.

Answer Posted / guest

Answer: C

Public key encryption, also known as asymmetric key
cryptography, uses a public key to encrypt the message and a
private key to decrypt it.

Is This Answer Correct ?    10 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

purchase orders issued to vendors have been authorized as per the authorization matrix

1205


WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2975