Provide required screenshots that document lab completion.
Write an encryption usage policy that is appropriate for the Course Security scenario.
Write a remote access policy that is appropriate for the Course Security scenario.
Explain why both public and private keys are needed in an asymmetric key pair.