Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
A. A 16-bit encryption key.
B. A message digest.
C. A digital signature.
D. A public key and a private key.
Answer: D
You might also like to view...
Which type of supply chain collaboration methods includes the vendor replenishing standard merchandise while the buyer manages the replenishment of promotion merchandise?
a. Continuous Replenishment (CRP) or Vendor Managed Inventory (VMI) b. Co-Managed Inventory c. Collaborative Forecasting and Replenishment (CFAR) d. Collaborative Planning, Forecasting and Replenishment (CPFR)
Which culture exists in organizations where making money is the top priority?
A. market B. fragmented C. mercenary D. communal
What does the moral identity measure determine that the moral courage measure does not?
a. moral agency b. internalizing or externalizing ethics c. ethical action d. moral goals
Which of the following makes negotiable instruments transferable to a third party?
A) an insurance B) an indorsement C) a bill of exchange D) a trade acceptance