What is the primary method of authentication used in a typical PKI deployment?

A. Biometrics
B. Digital certificates
C. Smart cards
D. Passwords


Answer: B. Digital certificates

Computer Science & Information Technology

You might also like to view...

When you are writing data to a file, in most cases you will use the Write method.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

By default, Flash uses the TWM engine to create text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ tag is used to define a section of text and/or images that belong together.

A. command B. cluster C. section D. aggregate

Computer Science & Information Technology

What do programmers call the process of identifying and correcting syntactical errors in a program?

A) fixing B) compiling C) interpreting D) debugging

Computer Science & Information Technology