The system of using digital certificates,CAs,and other registration authorities that verify and authenticate the validity of each party involved in a transaction over a public network is known as ____.

A. AAA server
B. AAA infrastructure
C. public cryptography
D. public key infrastructure (PKI)


Answer: D

Computer Science & Information Technology

You might also like to view...

List four of the items that the EBK specifies for the implementation function.

What will be an ideal response?

Computer Science & Information Technology

Under what circumstances would you recommend the use of the staged representation of the CMMI?

What will be an ideal response?

Computer Science & Information Technology

In ____________________, the hacker can see both parties, observe the responses from the target computer, and respond accordingly.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

After the Finish and Merge step is completed when creating a group of envelopes, each individual is separated by ________ section breaks

A) next page B) same page C) new page D) continuous

Computer Science & Information Technology