In a public key encryption algorithm ____.
A) the public key is used for encryption and the private key is used for decryption
B) the private key is used for encryption and the public key is used for decryption
C) a private key is used for both encryption and decryption
D) a public key is used for both encryption and decryption
E) a symmetric key is used for both encryption and decryption
Correct Answer:
Verified
Q12: In Secure Socket Layer (SSL) technology on
Q13: Of the following choices, the most advisable
Q14: All of the following are rules of
Q15: All of the following are true about
Q16: A proxy server _.
A) is a software
Q18: Recovering from a data entry error discovered
Q19: All of the following are methods of
Q20: All of the following are types of
Q21: Passwords should appear on the terminal screen
Q22: All of the following are true about
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents