Which of the following scenarios would not use a PKI?

A. E-commerce and web logins
B. E-mail and other communications
C. Symmetric key algorithms
D. Virtual private networks


C. Symmetric key algorithms don't use a PKI. PKIs usually use a symmetric key algorithm but can use symmetric key algorithms as well.

Computer Science & Information Technology

You might also like to view...

Which of these statements best defines scope?

a. Scope refers to the classes that have access to a variable. b. Scope determines whether a variable’s value can be altered. c. Scoping allows you to use a class without using its fully qualified name. d. Scope is the portion of a program that can refer to an entity by its simple name.

Computer Science & Information Technology

Image loading that is jerky, erratic and slow can benefit from ____.

A. image caching B. delayed image loading C. the getElementById() method D. use of the innerHTML property

Computer Science & Information Technology

What are the three command used to properly edit the /etc/passwd file?

A. usermod B. usercreate C. useradd D. userdel

Computer Science & Information Technology

If the tree must be traversed frequently, using stacks rather than recursion may be more efficient.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology