When confidentiality is the primary concern, and a secure channel for key exchange is not available,
which of the following should be used for transmitting company documents?

A.
Digital Signature
B.
Symmetric
C.
Asymmetric
D.
Hashing
Explanation:
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to
as the public key and the private key. Asymmetric algorithms do not require a secure channel for the
initial exchange of secret keys between the parties.
Incorrect Answers:
A: A digital signature is similar in function to a standard signature on a document. It validates the integrity
of the message and the sender.
B: Symmetric encryption would not in itself help on an unsecure channel.
D: Hashing is used to prove the integrity of data to prove that it hasn’t been modified.https://en.wikipedia.org/wiki/Public-key_cryptography
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 249-251, 256, 261, 291