Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?

A. A 16-bit encryption key.
B. A message digest.
C. A digital signature.
D. A public key and a private key.


Answer: D

Business

You might also like to view...

Which type of supply chain collaboration methods includes the vendor replenishing standard merchandise while the buyer manages the replenishment of promotion merchandise?

a. Continuous Replenishment (CRP) or Vendor Managed Inventory (VMI) b. Co-Managed Inventory c. Collaborative Forecasting and Replenishment (CFAR) d. Collaborative Planning, Forecasting and Replenishment (CPFR)

Business

Which culture exists in organizations where making money is the top priority?

A. market B. fragmented C. mercenary D. communal

Business

What does the moral identity measure determine that the moral courage measure does not?

a. moral agency b. internalizing or externalizing ethics c. ethical action d. moral goals

Business

Which of the following makes negotiable instruments transferable to a third party?

A) an insurance B) an indorsement C) a bill of exchange D) a trade acceptance

Business