A digital certificate works by providing a(n) ________

A) encrypted certificate pair B) public key pair
C) private pairs D) cryptographic key pair


D

Computer Science & Information Technology

You might also like to view...

A waiting thread transitions back to the ________ state only when another thread notifies it to continue executing.

a. runnable b. terminated c. new d. blocked

Computer Science & Information Technology

Which of the following protocols is used to query directory services databases?

A. LDAP B. Kerberos C. EAP D. NTP

Computer Science & Information Technology

Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software.

A. colocation B. fuzzy logic C. lights-out management D. none of the above

Computer Science & Information Technology

What is a benefit of a host-based firewall?

A. Prevent the installation of malware. B. Prevent users from accessing unauthorized files stored on network shares. C. Block attacks originating from the local network. D. Stop attacks from the keyboard.

Computer Science & Information Technology