A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.?

A. ?certificate
B. ?certificate authority
C. ?PKI
D. ?digital signature


Answer: D

Computer Science & Information Technology

You might also like to view...

Discuss the aim of the application and system security function.

What will be an ideal response?

Computer Science & Information Technology

A management information system (MIS) is exactly the same as a transaction processing system (TPS); the two terms can be used interchangeably.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Active Directory is a ____ that houses information about all network resources such as servers, printers, user accounts, groups of user accounts, security policies, and other information.

A. file service B. domain C. directory service D. module

Computer Science & Information Technology

Case-Based Critical Thinking Questions ? Case 11-4 ? Mathew has created a website using JavaScript. He wants to add a feature which allows a user to change the color of the cursor image with a single click on it. He uses the click point for the cursor to accomplish this. What will be the default location of the click point of the cursor if no coordinates have been assigned to it?

A. (x, 0) B. (0, 0) C. (0, y) D. (x, y)

Computer Science & Information Technology