Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
A . PKI uses an independent administrator to manage the public key.
B . The public key is authenticated against reliable third-party identification.
C . PKI’s public accessibility allows it to be used readily for e-commerce.
D . The private key uniquely authenticates each party to a transaction.
Answer: D
Latest IIA-CIA-Part3 Dumps Valid Version with 402 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund