PrepAway - Latest Free Exam Questions & Answers

Which statement describes how VPN traffic is encrypted to provide confidentiality when using asymmetric encryp

Which statement describes how VPN traffic is encrypted to provide confidentiality when using asymmetric encryption?

PrepAway - Latest Free Exam Questions & Answers

A.
The sender encrypts the data using the sender’s private key, and the receiver decrypts the data using the sender’s public key.

B.
The sender encrypts the data using the sender’s public key, and the receiver decrypts the data using the sender’s private key.

C.
The sender encrypts the data using the sender’s public key, and the receiver decrypts the data using the receiver’s public key.

D.
The sender encrypts the data using the receiver’s private key, and the receiver decrypts the data using the receiver’s public key.

E.
The sender encrypts the data using the receiver’s public key, and the receiver decrypts the data using the receiver’s private key.

F.
The sender encrypts the data using the receiver’s private key, and the receiver decrypts the data using the sender’s public key.

Explanation:

3 Comments on “Which statement describes how VPN traffic is encrypted to provide confidentiality when using asymmetric encryp

  1. Luis Cifer says:

    QR:
    Asymmetric Encryption
    Following are the steps used in asymmetric encryption:
    STEP 1. User A acquires User B’s public key.
    STEP 2. User A uses User B’s public key to encrypt a message, which is often a symmetric key, using an agreed-upon algorithm.
    STEP 3. User A transmits the encrypted message.
    STEP 4. User B uses his private key to decrypt, and reveal, the message.




    0



    0
  2. juantron says:

    Asymmetric Algorithms for Confidentiality
    Public Key (Encrypt) + Private Key (Decrypt) = Confidentiality
    The following steps are involved in asymmetric encryption to provide confidentiality:
    Step 1. Sender acquires receiver’s public key (Alice asks Bob for his public key and Bob sends it to her).
    Step 2. Sender encrypts the message using the receiver’s public key.
    – Remember that this key is known to everyone. Often the public key is a symmetric key.
    Step 3. The encrypted message is sent to the receiver.
    Step 4. The receiver will decrypt the message with his private key.
    – Only the receiver can decrypt the message because no one else has the private key.




    0



    0

Leave a Reply