Which of the following is not a component of a digital certificate?
(a) The subject’s public key.
(b) A serial number and expiration date.
(c) The hash function used to encrypt the message
(d) The signature of a trusted certification authority.
(c) The hash function used to encrypt the message
You might also like to view...
When opening a file, use this method to determine whether a file exists before you attempt to open it:
a. ExistFile(filename) b. IO.Exists(filename) c. System.IO.File.Exists(filename) d. System.File.Exists(filename)
Column references in cell ranges must be typed using uppercase.
a. true b. false c. not enough information
Which of the following is not true regarding collaborating and presenting?
A) In business, collaborating effectively with your coworkers is a valuable skill. B) Microsoft provides many methods for collaboration through its Office applications and SkyDrive. C) With Microsoft's SkyDrive and PowerPoint Web App you can share your presentation and collaborate with anyone who has PowerPoint installed. D) With the PowerPoint application itself you can add comments to explain to the others your thoughts on a particular topic and even keep track of changes that others have made or suggested.
The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO
a. Templates b. Definitions c. Containers d. Objects