COMPUTER NETWORKING

NETWORK MANAGEMENT

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A string of text that has been converted to a secure form using encryption.
A
encryption
B
decryption
C
ciphertext
D
plaintext
Explanation: 

Detailed explanation-1: -Ciphertext is encrypted text transformed from plaintext using an encryption algorithm. Ciphertext can’t be read until it has been converted into plaintext (decrypted) with a key.

Detailed explanation-2: -Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

Detailed explanation-3: -Asymmetric encryption is also known as public key cryptography, which is a relatively new method, compared to symmetric encryption. Asymmetric encryption uses two keys to encrypt a plain text.

There is 1 question to complete.