Which of the following is used to associate a public key with an identity?

A) Encryption
B) Digital hash
C) Digital certificate
D) Digital signature

C) Digital certificate

Computer Science & Information Technology

You might also like to view...

Which statement is false:

a. A weak_ptr points to the resource managed by a shared_ptr without assuming any responsibility for it. b. The reference count for a shared_ptr doesn’t increase when a weak_ptr references it. That means that the resource of a shared_ptr can be deleted while there are still weak_ptrs pointing to it. When the last shared_ptr is destroyed, the resource is deleted and any remaining weak_ptrs are set to NULL. c. One use for weak_ptr s is to avoid memory leaks caused by circular references. d. None of the above.

Computer Science & Information Technology

Methods that operate on an object's fields are called __________.

a. instance variables b. instance methods c. public methods d. private methods

Computer Science & Information Technology