Explain why both public and private keys are needed in an asymmetric key pair.
Provide required screenshots that document lab completion. Write an encryption usage policy that is appropriate for the Course Security scenario. Write a remote access policy that is appropriate for the Course Security scenario. Explain why both public and private keys are needed in an asymmetric key pair.