Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?
A) A message digest.
B) A 16-bit encryption key.
C) A public key and a private key.
D) A digital signature.
Correct Answer:
Verified
Q48: Which of the following statements is true
Q49: What could result from the failure to
Q50: Encryption is a control that changes plain
Q51: A RAID array implemented in a data
Q52: Which of the following is not one
Q53: Both ISACA and the GTAG define vulnerability.Which
Q54: A Public Key Infrastructure (PKI)provides the ability
Q56: Which of the following is not an
Q57: Which of the following best illustrates the
Q58: Which of the following statements is most
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents