Home>> Network Security MCQs >> In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.

In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
A. Private key
B. Public key

C. No key
D. None of the choices are correct.

ANSWER: B) Public key
Explanation : No Explantion Given

Network Security MCQs

More Computer ad Network Security MCQs

Network Security MCQs

More MCQs