Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
A . PKI uses an independent administrator to manage the public key.
B . The public key is authenticated against reliable third-party identification.
C . PKI’s public accessibility allows it to be used readily for e-commerce.
D . The private key uniquely authenticates each party to a transaction.
Answer: D
Latest IIA-CIA-Part3-3P Dumps Valid Version with 412 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments