Which statement describes how VPN traffic is encrypted to provide confidentiality when using asymmetric
encryption?
A.
The sender encrypts the data using the sender’s private key, and the receiver decrypts the data using the
sender’s public key.
B.
The sender encrypts the data using the sender’s public key, and the receiver decrypts the data usingthe
sender’s private key.
C.
The sender encrypts the data using the sender’s public key, and the receiver decrypts the data usingthe
receiver’s public key.
D.
The sender encrypts the data using the receiver’sprivate key, and the receiver decrypts the data using the
receiver’s public key.
E.
The sender encrypts the data using the receiver’spublic key, and the receiver decrypts the data using the
receiver’s private key.
F.
The sender encrypts the data using the receiver’sprivate key, and the receiver decrypts the data using the
sender’s public key.