NETWORK MANAGEMENT
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Backup
|
|
Cryption
|
|
Encryption
|
|
None of the above
|
Detailed explanation-1: -The encryption algorithm uses the key to scramble the contents of the message. This encrypted message is called ciphertext.
Detailed explanation-2: -Asymmetric, or public/private encryption, uses a pair of keys. Data encrypted with one key are decrypted only with the other key in the public/private key pair. When an asymmetric key pair is generated, the public key is typically used to encrypt, and the private key is typically used to decrypt.
Detailed explanation-3: -What is asymmetric encryption? Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.