F5 Certification Boot Camp 101 for Public Sector Application Delivery Fundamentals
HTML-код
- Опубликовано: 28 сен 2024
- SUBSCRIBE to get the latest tech tips & tricks from industry leaders!
/ carahtechtv
FOLLOW US ON TWITTER:
/ carahsoft
CONNECT WITH US ON LINKEDIN:
/ carahsoft
LIKE US ON FACEBOOK:
/ carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
www.carahsoft....
READ THE LATEST TECH COMMUNITY TRENDS:
www.carahsoft....
19:58 Really Start
I'm sorry, but at 2:21:32 I think there is a mistake when answering the question. If I understood the question correctly, the correct answer would be "C".
Hey dude, The correct answer is letter B, the sender uses your public key to encryopt, an the recipient uses your private key to decyrpt.
@@davidribeiro5247 I also think that either the question is wrongly phrased or just wrong, If I am the sender, I will use the recipient public key to encrypt messages (hence public key exchange) so he can decrypt the nessages with the receipient private key (his own). The receipient wont have the sender private key to decrypt anything.
@@asald7949 This is correct! Both keys BELONG to the recipient, public and private, encryption and decryption.
10:44 hahahaha