______ is the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography.

Fill in the blank(s) with the appropriate word(s).

Public-key infrastructure (PKI)

Computer Science & Information Technology

You might also like to view...

What does the INSERT statement use to fetch data from one table to insert it into the target table?

a. UPDATE statement b. SELECT statement c. ALTER statement

Computer Science & Information Technology

Object-oriented languages focus on the objects of programming, not just the actions performed on them.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology