What are the four primary components of a public key infrastructure implementation?

A. Confidentiality, Integrity, Availability, and Non-repudiation
B. Public key encryption, split-key encryption, initialization vectors, biometrics
C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates
D. Authentication, Authorization, Accounting, and Availability


Answer: C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates

Computer Science & Information Technology

You might also like to view...

GPS stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The most common type of keyboard is the standard ________ format

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which rootkit intercepts system calls and modifies them as required?

a. Flea b. T0rm c. Adorn d. LKM

Computer Science & Information Technology

Describe and contrast the test data method with the integrated test facility.

What will be an ideal response?

Computer Science & Information Technology