How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
A . Hash value
B . Private key
C . Digital signature
D . Digital certificate

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments