In asymmetric encryption, the public key is used for ____________, while the private key is used for ____________.
- Encryption, Decryption
- Decryption, Encryption
- Authentication, Encryption
- Encryption, Authentication
In asymmetric encryption, the public key is used for encrypting data that can only be decrypted using the corresponding private key. Thus, the correct pair is Option 2. Option 1 is incorrect as the private key is used for decryption, not encryption. Option 3 is incorrect as asymmetric encryption is not primarily used for authentication. Option 4 is incorrect as it does not accurately represent the roles of public and private keys in asymmetric encryption.
Loading...
Related Quiz
- What is the significance of referential integrity constraints in data consistency testing?
- Scenario: During a performance audit, you discover that a database query is taking longer to execute than expected. What is a possible strategy to optimize this query without modifying the application code?
- One of the key challenges in compliance and regulatory testing is ensuring ongoing ____________ with evolving standards.
- During stress testing, if the system fails to recover gracefully after reaching its limits, what type of issue is likely occurring?
- When conducting ETL process testing, what is meant by data lineage analysis?