F5 Certification Boot Camp 101 for Public Sector Application Delivery Fundamentals

Поделиться
HTML-код
  • Опубликовано: 28 сен 2024
  • SUBSCRIBE to get the latest tech tips & tricks from industry leaders!
    / carahtechtv
    FOLLOW US ON TWITTER:
    / carahsoft
    CONNECT WITH US ON LINKEDIN:
    / carahsoft
    LIKE US ON FACEBOOK:
    / carahsoft
    LISTEN TO US ON OUR CARAHCAST CHANNEL:
    www.carahsoft....
    READ THE LATEST TECH COMMUNITY TRENDS:
    www.carahsoft....

Комментарии • 6

  • @nevescutambo2843
    @nevescutambo2843 Год назад +1

    19:58 Really Start

  • @khalidelgourte7468
    @khalidelgourte7468 2 года назад +3

    I'm sorry, but at 2:21:32 I think there is a mistake when answering the question. If I understood the question correctly, the correct answer would be "C".

    • @davidribeiro5247
      @davidribeiro5247 2 года назад

      Hey dude, The correct answer is letter B, the sender uses your public key to encryopt, an the recipient uses your private key to decyrpt.

    • @asald7949
      @asald7949 2 года назад +3

      @@davidribeiro5247 I also think that either the question is wrongly phrased or just wrong, If I am the sender, I will use the recipient public key to encrypt messages (hence public key exchange) so he can decrypt the nessages with the receipient private key (his own). The receipient wont have the sender private key to decrypt anything.

    • @jasonmartin521
      @jasonmartin521 Год назад

      @@asald7949 This is correct! Both keys BELONG to the recipient, public and private, encryption and decryption.

  • @leonrider6601
    @leonrider6601 2 года назад

    10:44 hahahaha