COMPUTER NETWORKING

NETWORK MANAGEMENT

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In which process data jumbled using a key so it cannot be understood.
A
Backup
B
Cryption
C
Encryption
D
None of the above
Explanation: 

Detailed explanation-1: -The encryption algorithm uses the key to scramble the contents of the message. This encrypted message is called ciphertext.

Detailed explanation-2: -Asymmetric, or public/private encryption, uses a pair of keys. Data encrypted with one key are decrypted only with the other key in the public/private key pair. When an asymmetric key pair is generated, the public key is typically used to encrypt, and the private key is typically used to decrypt.

Detailed explanation-3: -What is asymmetric encryption? Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

There is 1 question to complete.