What are the four primary components of a public key infrastructure implementation?
A. Confidentiality, Integrity, Availability, and Non-repudiation
B. Public key encryption, split-key encryption, initialization vectors, biometrics
C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates
D. Authentication, Authorization, Accounting, and Availability
Answer: C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates
You might also like to view...
GPS stands for ________
Fill in the blank(s) with correct word
The most common type of keyboard is the standard ________ format
Fill in the blank(s) with correct word
Which rootkit intercepts system calls and modifies them as required?
a. Flea b. T0rm c. Adorn d. LKM
Describe and contrast the test data method with the integrated test facility.
What will be an ideal response?