______ is the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography.

Fill in the blank(s) with the appropriate word(s).


Public-key infrastructure (PKI)

Computer Science & Information Technology

You might also like to view...

Submenus are also called ____.

A. level menus B. auxiliary menus C. child menus D. demoted menus

Computer Science & Information Technology

________ allows you to move from record to record and field to field using keystrokes

A) Design view B) Edit mode C) Layout view D) Navigation mode

Computer Science & Information Technology

A problem that results from incorrectly written code is known as a bug.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which need to be longer—symmetric keys or public keys?

A. Public-private key pairs B. Key length doesn't matter C. All keys should have same length D. Private keys

Computer Science & Information Technology