In PGP, ____ trust is established when a user trusts his or her own key pair.
A. marginal
B. complete
C. explicit
D. implicit
Answer: D
Computer Science & Information Technology
You might also like to view...
A shadow password file is a(n) ________.
a) imitation password file used by the system to trick malicious users b) false password file that is placed on a system by a malicious user c) password file that is accessible only by users with root privileges d) deleted password file that is still stored in memory
Computer Science & Information Technology
When are open-ended questions appropriate for use in interviewing?
What will be an ideal response?
Computer Science & Information Technology
Are there general guidelines that apply to the timing of a post-implementation evaluation? What are they?
What will be an ideal response?
Computer Science & Information Technology
SmartArt shapes can be moved.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology