Seamus’ company wants him to implement security for transactions across the company intranet.
The solution Seamus has chosen to implement is public/private key encryption. Which of the
following security schemes should he deploy?
A.
Asymmetric encryption
B.
Server-side encryption
C.
Trapdoor encryption
D.
Symmetric encryption