A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.?
A. ?certificate
B. ?certificate authority
C. ?PKI
D. ?digital signature
Answer: D
You might also like to view...
Discuss the aim of the application and system security function.
What will be an ideal response?
A management information system (MIS) is exactly the same as a transaction processing system (TPS); the two terms can be used interchangeably.
Answer the following statement true (T) or false (F)
Active Directory is a ____ that houses information about all network resources such as servers, printers, user accounts, groups of user accounts, security policies, and other information.
A. file service B. domain C. directory service D. module
Case-Based Critical Thinking Questions ? Case 11-4 ? Mathew has created a website using JavaScript. He wants to add a feature which allows a user to change the color of the cursor image with a single click on it. He uses the click point for the cursor to accomplish this. What will be the default location of the click point of the cursor if no coordinates have been assigned to it?
A. (x, 0) B. (0, 0) C. (0, y) D. (x, y)