Which of the following trust models does PGP use?

a. Full trust
b. Single authority trust
c. Hierarchical trust
d. Web of trust


ANS: D

Computer Science & Information Technology

You might also like to view...

In the code below

``` function Rectangle(x, y) { this.x = x; this.y = y; this.width = 40; this.height = 20; this.moveDown = function () { this.y += 5; }; } ``` rectangleA is ______. A. an object B. a constructor function

Computer Science & Information Technology

By default, each cell in a table has its own border.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The group that contains a list of blocks that can help structure a macro is the ________ group

A) Program Flow B) Action Guide C) Submacro D) Action Catalog

Computer Science & Information Technology

Which of the following is considered a backup rotation scheme?

A. full/incremental backup B. grandfather/father/son C. full/differential backup D. copy backup

Computer Science & Information Technology