Which of the following scenarios would not use a PKI?
A. E-commerce and web logins
B. E-mail and other communications
C. Symmetric key algorithms
D. Virtual private networks
C. Symmetric key algorithms don't use a PKI. PKIs usually use a symmetric key algorithm but can use symmetric key algorithms as well.
You might also like to view...
Which of these statements best defines scope?
a. Scope refers to the classes that have access to a variable. b. Scope determines whether a variable’s value can be altered. c. Scoping allows you to use a class without using its fully qualified name. d. Scope is the portion of a program that can refer to an entity by its simple name.
Image loading that is jerky, erratic and slow can benefit from ____.
A. image caching B. delayed image loading C. the getElementById() method D. use of the innerHTML property
What are the three command used to properly edit the /etc/passwd file?
A. usermod B. usercreate C. useradd D. userdel
If the tree must be traversed frequently, using stacks rather than recursion may be more efficient.
Answer the following statement true (T) or false (F)