The core services provided by PKI are ____, integrity and confidentiality.

A. authentication
B. authorization
C. availability
D. nonrepudiation


Answer: A

Computer Science & Information Technology

You might also like to view...

Which assignment statements will copy the value " toaster" into a string variable (str1)?

a. strcpy(str1,"toaster"); b. str1 = "toaster"; c. str1 = toaster; d. str1 += toaster;

Computer Science & Information Technology

Every object used in an object-oriented program is created from a ____, which is a pattern that the computer uses to create the object.

A. class B. basic type C. structure D. template

Computer Science & Information Technology

The ________ Print view contains a check box to designate whether to print hidden slides

Fill in the blank(s) with correct word

Computer Science & Information Technology

When assigning a command button to a macro, by default the button displays on the DEVELOPER tab

Indicate whether the statement is true or false

Computer Science & Information Technology