Which of the following situations would be the best environment for use of a symmetric cryptosystem?
a. Corporate e-mail system
b. Site-to-site VPN
c. Certificate authority
d. Web site certificates
Ans: b. Site-to-site VPN
Computer Science & Information Technology
You might also like to view...
______________ testing is used to test the interactions between different functions in a program.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An object represents something in the physical world, not abstract ideas.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Write the steps you would take to sort the contents of a file.
What will be an ideal response?
Computer Science & Information Technology
You can create process colors by creating a new swatch in the New Color Swatch dialog box.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology