Which of the following encryption methods does PKI typically use to securely protect keys?

A. Elliptic curve
B. Digital signatures
C. Asymmetric
D. Obfuscation


Answer: C. Asymmetric

Computer Science & Information Technology

You might also like to view...

The data in a file are normally accessed one __________ at a time.

a. field b. character c. record d. data element

Computer Science & Information Technology

If you wish to monitor logon failures, what should you do?

What will be an ideal response?

Computer Science & Information Technology

The Excel ________ function uses a logical test to check whether a condition is met, and then returns one value if true and another value if false

Fill in the blank(s) with correct word

Computer Science & Information Technology

To select nonadjacent files and folders from a list, press ________, and then click each file you wish to select

A) Option B) Alt C) Control D) Shift

Computer Science & Information Technology