Which of the following situations would be the best environment for use of a symmetric cryptosystem?

a. Corporate e-mail system
b. Site-to-site VPN
c. Certificate authority
d. Web site certificates


Ans: b. Site-to-site VPN

Computer Science & Information Technology

You might also like to view...

______________ testing is used to test the interactions between different functions in a program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An object represents something in the physical world, not abstract ideas.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Write the steps you would take to sort the contents of a file.

What will be an ideal response?

Computer Science & Information Technology

You can create process colors by creating a new swatch in the New Color Swatch dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology