If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:November 15, 2020
  • Reading time:1 mins read

Last Updated on November 15, 2020 by Admin

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

  • DH
  • a private key
  • a digital certificate
  • a different public key
    Answers Explanation & Hints:

    When an asymmetric algorithm is used, public and private keys are used for the encryption. Either key can be used for encryption, but the complementary matched key must be used for the decryption. For example if the public key is used for encryption, then the private key must be used for the decryption.

For more question and answers:

Click Here CCNA3 v7 – ENSA – Modules 3 – 5: Network Security Exam Answers Full 100%

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments