The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

A. ECC B. RSA

C. DSS D. XOR


C. DSS

Computer Science & Information Technology

You might also like to view...

To change the shape of a drawing object once it has been drawn, double-click the shape with the ____________________ Tool, and then drag the object's border to reshape it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Mobile broadband offers access to the Internet through high-speed cellular technologies.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

List three recommendations to help secure a wireless network.

What will be an ideal response?

Computer Science & Information Technology

HTTPS would more likely to be used for Internet banking than HTTP

Indicate whether the statement is true or false

Computer Science & Information Technology