What are the four primary components of a public key infrastructure implementation?

A. Confidentiality, Integrity, Availability, and Non-repudiation
B. Public key encryption, split-key encryption, initialization vectors, biometrics
C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates
D. Authentication, Authorization, Accounting, and Availability

Answer: C. Symmetric encryption, asymmetric encryption, hashing, and digital certificates

Computer Science & Information Technology

You might also like to view...

Your company is a health care provider and is considering outsourcing it messaging system to a managed service provider. In the proposal presented, it makes no mention of a DLP functionality. If this is not present, which of the following are you in danger of experiencing?

A. poor messaging performance B. loss of PII C. open email relay D. unauthenticated sessions

Computer Science & Information Technology

Law enforcement agencies use tape recorders for reporting so officers can

a. dictate their reports into phone-activated recorders. b. prevent people outside the agency from understanding the report. c. dictate coded report information. d. carry a stenographer in the patrol car.

Computer Science & Information Technology