COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Data is translated into a code which can only be understood by a key
A
Anti Malware
B
Network Forensics
C
Encryption
D
User Access Levels
Explanation: 

Detailed explanation-1: -What is asymmetric encryption? Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

There is 1 question to complete.