Which of the following encryption methods does PKI typically use to securely protect keys?
A. Elliptic curve
B. Digital signatures
C. Asymmetric
D. Obfuscation
Answer: C. Asymmetric
Computer Science & Information Technology
You might also like to view...
The data in a file are normally accessed one __________ at a time.
a. field b. character c. record d. data element
Computer Science & Information Technology
If you wish to monitor logon failures, what should you do?
What will be an ideal response?
Computer Science & Information Technology
The Excel ________ function uses a logical test to check whether a condition is met, and then returns one value if true and another value if false
Fill in the blank(s) with correct word
Computer Science & Information Technology
To select nonadjacent files and folders from a list, press ________, and then click each file you wish to select
A) Option B) Alt C) Control D) Shift
Computer Science & Information Technology