When an organization wants to use encryption, it requests a set of associated public and private keys from a ____.

A. proxy server
B. network administrator
C. network firewall
D. certification authority

Answer: D

Computer Science & Information Technology

You might also like to view...

The ________ is the left border of a chart with the value labels

A) plot area B) horizontal axis C) vertical axis D) grid area

Computer Science & Information Technology

In Excel, numbers are used as column headings

Indicate whether the statement is true or false

Computer Science & Information Technology