Does a PKI use symmetric or asymmetric encryption? Explain your answer.

What will be an ideal response?


PKIs use asymmetric encryption algorithms to digitally sign certificates.

Computer Science & Information Technology

You might also like to view...

A spam filter is a type of utility software that captures unsolicited e-mail messages before they reach your Inbox.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A user can select two different Page Layouts; Portrait that has a vertical orientation and ________ that has a horizontal orientation

A) Landscape B) Extended C) Wide D) Flat

Computer Science & Information Technology

Start PowerPoint, click the ____ tab, and then click New to view the Available Templates and Themes in Backstage view.

A. Home B. Insert C. Review D. File

Computer Science & Information Technology

Frames in a Flash movie are similar to frames in a motion picture.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology