Which of the following is not a component of a digital certificate?

(a) The subject’s public key.
(b) A serial number and expiration date.
(c) The hash function used to encrypt the message
(d) The signature of a trusted certification authority.


(c) The hash function used to encrypt the message

Computer Science & Information Technology

You might also like to view...

When opening a file, use this method to determine whether a file exists before you attempt to open it:

a. ExistFile(filename) b. IO.Exists(filename) c. System.IO.File.Exists(filename) d. System.File.Exists(filename)

Computer Science & Information Technology

Column references in cell ranges must be typed using uppercase.

a. true b. false c. not enough information

Computer Science & Information Technology

Which of the following is not true regarding collaborating and presenting?

A) In business, collaborating effectively with your coworkers is a valuable skill. B) Microsoft provides many methods for collaboration through its Office applications and SkyDrive. C) With Microsoft's SkyDrive and PowerPoint Web App you can share your presentation and collaborate with anyone who has PowerPoint installed. D) With the PowerPoint application itself you can add comments to explain to the others your thoughts on a particular topic and even keep track of changes that others have made or suggested.

Computer Science & Information Technology

The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO

a. Templates b. Definitions c. Containers d. Objects

Computer Science & Information Technology