In PGP, ____ trust is established when a user trusts his or her own key pair.

A. marginal
B. complete
C. explicit
D. implicit


Answer: D

Computer Science & Information Technology

You might also like to view...

A shadow password file is a(n) ________.

a) imitation password file used by the system to trick malicious users b) false password file that is placed on a system by a malicious user c) password file that is accessible only by users with root privileges d) deleted password file that is still stored in memory

Computer Science & Information Technology

When are open-ended questions appropriate for use in interviewing?

What will be an ideal response?

Computer Science & Information Technology

Are there general guidelines that apply to the timing of a post-implementation evaluation? What are they?

What will be an ideal response?

Computer Science & Information Technology

SmartArt shapes can be moved.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology