Which of the following is the best definition for a hybrid public/private key approach?

A.
Employs two keys, public and private, generated by an asymmetric algorithm for protecting encryption keys, and a secret key is generated by a symmetric algorithm to be used for bulk encryption.
B.
Employs two keys, public and private, generated by a symmetric algorithm for protecting encryption keys, and a secret key is generated by an asymmetric algorithm to be used for bulk encryption.
C.
Employs a single key, private, generated by a symmetric algorithm for protecting encryption keys, and a public/private key pair is generated and used for bulk encryption.
D.
Employs a single key, public, generated by a symmetric algorithm for protecting encryption keys, and a public/private key pair is generated and used for bulk encryption.
Explanation:
The answer is descriptive of a hybrid approach of public/private
algorithms and keys.