C) team leader is the answer
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.
a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.
c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption
d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.
So e is the only logical answer.
Virtualization. To enable easy deployment and scalability, it should be easy to spin up new machines on request. Virtualization offers the possibility to clone operating systems and deploy solutions independent of the actual hardware.
Answer:
D. a potential hazard
Explanation:
Abrupt changes in road surface or the shape of the road may indicate a potential hazard.
Answer:
3 is true others are false