Last Updated on March 17, 2021 by Admin
CyberOps - Associate 1.0 & 1.01 | |
Final Exam | |
Practice Final Exam Answers | Online Test |
Final Exam Answers | Online Test |
200-201 Certification Practice | Online Test |
Which two statements describe the use of asymmetric algorithms? (Choose two.)
- If a private key is used to encrypt the data, a private key must be used to decrypt the data.
- If a public key is used to encrypt the data, a public key must be used to decrypt the data.
- Public and private keys may be used interchangeably.
- If a private key is used to encrypt the data, a public key must be used to decrypt the data.
- If a public key is used to encrypt the data, a private key must be used to decrypt the data.
Answers Explanation & Hints: Asymmetric algorithms use two keys: a public key and a private key. Both keys are capable of the encryption process, but the complementary matched key is required for decryption. If a public key encrypts the data, the matching private key decrypts the data. The opposite is also true. If a private key encrypts the data, the corresponding public key decrypts the data.
CyberOps - Associate 1.0 & 1.01 | |
Final Exam | |
Practice Final Exam Answers | Online Test |
Final Exam Answers | Online Test |
200-201 Certification Practice | Online Test |