The core services provided by PKI are ____, integrity and confidentiality.
A. authentication
B. authorization
C. availability
D. nonrepudiation
Answer: A
Computer Science & Information Technology
You might also like to view...
Which assignment statements will copy the value " toaster" into a string variable (str1)?
a. strcpy(str1,"toaster"); b. str1 = "toaster"; c. str1 = toaster; d. str1 += toaster;
Computer Science & Information Technology
Every object used in an object-oriented program is created from a ____, which is a pattern that the computer uses to create the object.
A. class B. basic type C. structure D. template
Computer Science & Information Technology
The ________ Print view contains a check box to designate whether to print hidden slides
Fill in the blank(s) with correct word
Computer Science & Information Technology
When assigning a command button to a macro, by default the button displays on the DEVELOPER tab
Indicate whether the statement is true or false
Computer Science & Information Technology