A digital certificate associates _____.

A. a user's public key with his private key
B. the user's identity with his public key
C. a user's private key with the public key
D. a private key with a digital signature


Answer: B. the user's identity with his public key

Computer Science & Information Technology

You might also like to view...

If you have little work experience, you should use a functional resume

Indicate whether the statement is true or false

Computer Science & Information Technology

The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Choose the correct number expression in the following sentence.? Few predators will attack a full-grown giraffe; however, _____ of calves do not survive their first year.

A. ?75 percent B. ?75%

Computer Science & Information Technology

To use the Database Documenter, click the Database Documenter button on the ____ tab.

A. HOME B. CREATE C. DATABASE TOOLS D. EXTERNAL DATA

Computer Science & Information Technology