Questions
Answer the following questions to test your knowledge of this chapter:
- How are asymmetric encryption protocols used for encryption?
- Two public keys and two private keys are used to establish communications.
- The public key is used to encrypt the data, while the private key is used to decrypt the data
- The private key is used to encrypt the data, while the public key is used to decrypt the data.
- The same key is used for encryption and decryption; the difference is in the way they're used.
- What is integrity?
- Keeping information secret from unauthorized users
- Verifying the identity of the communication peers
- Keeping information unchanged through transmission
- Keeping the user's identity safe
- What is confidentiality?
- Keeping information hidden from unauthorized users
- Keeping the information secret from unauthorized users
- Keeping the information unchanged during transmission
- Protecting data from theft
- How are asymmetric encryption protocols used for encryption?
- Two...