When using Rights Management Services security, documents are encrypted using an AES key and what other additional key?
A. DSA
B. RSA
C. ECDSA
D. ECRSA
Answer: B
Computer Science & Information Technology
You might also like to view...
What is the process for using the Eyedropper tool to transfer text attributes?
What will be an ideal response?
Computer Science & Information Technology
As you type in the Chart in Microsoft Word window, the chart in the Word document is updated
Indicate whether the statement is true or false
Computer Science & Information Technology
You can save Web page files with an ____ extension.
A. .htm B. .html C. either a. or b. D. neither a. nor b.
Computer Science & Information Technology
Which prefix is used by all Teredo related addresses?
A. 2002::/16 B. 2001::/32 C. 2005:900d::1/16 D. 2001::/64
Computer Science & Information Technology