Start learning 50% faster. Sign in now
Public-key encryption using the recipient’s public key is the best choice for ensuring data confidentiality during transmission. This method leverages asymmetric encryption, where the recipient’s public key is used to encrypt the data, and only the recipient can decrypt it using their private key. This ensures that even if the data is intercepted during transmission, it cannot be read by unauthorized parties without access to the recipient's private key. For example, when a user sends an email encrypted with the recipient's public key, only the recipient can decrypt it, preserving confidentiality. Asymmetric encryption also avoids the risk of key compromise associated with pre-shared keys in symmetric encryption. Moreover, it scales better for secure communication across multiple parties because each participant needs only one pair of keys (public and private) instead of maintaining numerous shared keys. Why Other Options Are Incorrect:
To get bent out of shape
To feel under the weather
Mare's nest
Select the most appropriate meaning of the given idiom.
Cat and dog life
In the following question a proverb/idiom us given. Select the option that best describes the meaning of the given proverb/idiom.
The early bir...
The aged employees were offered a golden handshake by the management.
Find the correct meaning of highlighted word/phrase.
His father advised him to be fair and square in his dealings lest he should fall into tr...
A bolt from the blue
Choose the correct option showing the meaning of the Idiom highlighted in the given sentence
The team had a rough patch during the...
Rina’s house is at a stone’s throw from the school.