Which tasks are involved in configuring identity-based encryption (IBE)? (Select all that apply)

Which tasks are involved in configuring identity-based encryption (IBE)? (Select all that apply)
A . Generating public and private key pairs for users
B . Setting up a central certificate authority (CA)
C . Defining user identities based on email addresses
D . Creating email forwarding rules
E . Configuring SMTPS for secure email transmission

Answer: AC

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments