COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Data encrypted with a user’s public key can be decrypted with the user’s public key.
|
|
Data encrypted with a user’s public key can be decrypted with the user’s private key.
|
|
Data encrypted with a user’s private key can be decrypted with the user’s private key.
|
|
Data encrypted with a user’s private key can be decrypted with the user’s public key.
|
Detailed explanation-1: -Which of the following is true about Public Key infrastructure? PKI is a combination of digital certificates, public key cryptography, and certificate authorities that provide enterprise wide security.
Detailed explanation-2: -True, The preferred way of encryption is public key encryption. This method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use.
Detailed explanation-3: -Which of the following is a true statement about the use of public key encryption in transmitting messages? Public key encryption enables parties to initiate secure communication through an open medium, such as the Internet, in which there might be eavesdroppers.
Detailed explanation-4: -The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message.