________ integrates public-key cryptography with digital certificates and certificate authorities to authenticate parties in a transaction.

a) Public-Key Infrastructure.
b) Private-Key Infrastructure.
c) Digital-Key Infrastructure.
d) None of the above.


a) Public-Key Infrastructure.

Computer Science & Information Technology

You might also like to view...

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called?

A. manipulating online polls B. spamming C. spreading malware D. denying services

Computer Science & Information Technology

A ________ is used to indicate that an entrance effect has been applied to an animation

A) yellow circle B) green star C) blue star D) red circle

Computer Science & Information Technology

In static binding, the determination of which function is called is made ____.

A. at run time B. in the program code C. by the user D. at compile time

Computer Science & Information Technology

A _____ is two or more classful contiguous networks grouped together

a. Subnet b. Supernet c. Network d. Superwork

Computer Science & Information Technology