When confidentiality is the primary concern, and a secure channel for key exchange is not
available, which of the following should be used for transmitting company documents?
A.
Digital Signature
B.
Symmetric
C.
Asymmetric
D.
Hashing
Explanation:
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are
referred to as the public key and the private key. Asymmetric algorithms do not require a secure
channel for the initial exchange of secret keys between the parties.