When confidentiality is the primary concern, and a secure channel for key exchange is not available, which of
the following should be used for transmitting company documents?
A.
Digital Signature
B.
Symmetric
C.
Asymmetric
D.
Hashing
Explanation:
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to as the
public key and the private key. Asymmetric algorithms do not require a secure channel for the initial exchange
of secret keys between the parties.