When an organization wants to use encryption, it requests a set of associated public and private keys from a ____.
A. proxy server
B. network administrator
C. network firewall
D. certification authority
Answer: D
Computer Science & Information Technology
You might also like to view...
The ________ is the left border of a chart with the value labels
A) plot area B) horizontal axis C) vertical axis D) grid area
Computer Science & Information Technology
In Excel, numbers are used as column headings
Indicate whether the statement is true or false
Computer Science & Information Technology