When using Rights Management Services security, documents are encrypted using an AES key and what other additional key?

A. DSA
B. RSA
C. ECDSA
D. ECRSA


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the process for using the Eyedropper tool to transfer text attributes?

What will be an ideal response?

Computer Science & Information Technology

As you type in the Chart in Microsoft Word window, the chart in the Word document is updated

Indicate whether the statement is true or false

Computer Science & Information Technology

You can save Web page files with an ____ extension.

A. .htm B. .html C. either a. or b. D. neither a. nor b.

Computer Science & Information Technology

Which prefix is used by all Teredo related addresses?

A. 2002::/16 B. 2001::/32 C. 2005:900d::1/16 D. 2001::/64

Computer Science & Information Technology