COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Alice and Bob need to exchange some private data online. To do this, Alice creates an algorithm that will encrypt and decrypt data. They secretly meet to share the algorithm, then they each use the algorithm to encrypt their messages and decrypt each other’s messages.What kind of encryption process is this?
A
Symmetric
B
Public Key
C
Vingenere cipher
D
Firewall software
Explanation: 

Detailed explanation-1: -Alice can use her own Private Key to encrypt the message. Which makes it so the only key in the world that can decrypt her message is her Public key-which she knows Bob (and anyone else) has access to. The message is sent to Bob, who then uses Alice’s Public Key to decrypt the message.

Detailed explanation-2: -Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data.

Detailed explanation-3: -Which of the following best explains how a certificate authority is used in protecting data? A certificate authority verifies the authenticity of encryption keys used in secured communications.

Detailed explanation-4: -Which of the following best explains the relationship between the Internet and the World Wide Web? The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that are accessed via the Internet.

There is 1 question to complete.