CompTIA Security+ Exam Prep

Category - Engineering

Which of the following is a feature of Asymmetric cryptography?
  1. Both encryption and authentication can take place without sharing private keys.
  2. This cryptography uses the best algorithm possible.
  3. Encryption occurs only when both sides are authenticated.
  4. Encryption is limited to shared keys.
Explanation
Answer: A - Asymmetric cryptography ensures that both authentication and encryption can happen without sharing private keys.

Asymmetric cryptography, or public-key cryptography, is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. These asymmetric keys are referred to as the public key and the private key. It uses one key per circuit. The public key is used to encrypt the message and the private key is used to decrypt it.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz