FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Causes data, such as the content of an email, to be intelligible except to those who have the proper key to decrypt it
A
encryption
B
proxies
C
website/URL content filtering
D
web threat filtering
Explanation: 

Detailed explanation-1: -4. In which of the following encryption key is used to encrypt and decrypt the data? Explanation: In public-key (also known as asymmetric-key) encryption techniques, there are two different keys, the public key and the private key, used to encrypt and decrypt the data.

Detailed explanation-2: -In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption.

Detailed explanation-3: -Encryption makes data unintelligible, so secures it by design with the only way to unscramble it being a decryption key. Encryption is necessary to prevent the unauthorised processing of information, should that information be involved in a data breach scenario.

Detailed explanation-4: -The two keys are called the “public key” and the “private key” of the user. The network also has a public key and a private key. The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message.

There is 1 question to complete.