Does a PKI use symmetric or asymmetric encryption? Explain your answer.
What will be an ideal response?
PKIs use asymmetric encryption algorithms to digitally sign certificates.
Computer Science & Information Technology
You might also like to view...
A spam filter is a type of utility software that captures unsolicited e-mail messages before they reach your Inbox.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A user can select two different Page Layouts; Portrait that has a vertical orientation and ________ that has a horizontal orientation
A) Landscape B) Extended C) Wide D) Flat
Computer Science & Information Technology
Start PowerPoint, click the ____ tab, and then click New to view the Available Templates and Themes in Backstage view.
A. Home B. Insert C. Review D. File
Computer Science & Information Technology
Frames in a Flash movie are similar to frames in a motion picture.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology