What is the primary method of authentication used in a typical PKI deployment?
A. Biometrics
B. Digital certificates
C. Smart cards
D. Passwords
Answer: B. Digital certificates
Computer Science & Information Technology
You might also like to view...
When you are writing data to a file, in most cases you will use the Write method.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
By default, Flash uses the TWM engine to create text.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ____ tag is used to define a section of text and/or images that belong together.
A. command B. cluster C. section D. aggregate
Computer Science & Information Technology
What do programmers call the process of identifying and correcting syntactical errors in a program?
A) fixing B) compiling C) interpreting D) debugging
Computer Science & Information Technology