One of the most popular public key cryptosystems is a proprietary model named ____.

A. Triple DES
B. Rijndael
C. Rivest-Shamir-Aldeman (RSA)
D. certificate authority (CA)


Answer: C

Computer Science & Information Technology

You might also like to view...

____________________ is the act of confirming the identity or user account.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A presentation's security can be enhanced by changing its ________

A) properties B) timings C) password D) slide order

Computer Science & Information Technology

Most Web pages begin with "www" (which indicates that the page is on the World Wide Web), followed by a dot, or period, and then the Web site's name, known as the ____.

A. filename B. http C. domain name D. URL

Computer Science & Information Technology

When using the Custom data validation type, you can use a formula that evaluates to either true or false.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology