Which of the following scenarios would not use a PKI?

A. E-commerce and web logins
B. E-mail and other communications
C. Symmetric key algorithms
D. Virtual private networks

C. Symmetric key algorithms don't use a PKI. PKIs usually use a symmetric key algorithm but can use symmetric key algorithms as well.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about how the Internet began?

A) The original ARPANET had only four locations, called nodes. B) The Internet started as a U.S. Department of Defense ARPA project in the 1950s. C) It took about 10 years to develop the technology. D) In 1958, President Eisenhower created the Advanced Research Projects Agency (ARPA) to jump-start U.S. technology for the military.

Computer Science & Information Technology

____ provides the program code (help scripts) that actually creates Ruby on Rails applications and ties everything together.

A. Action Mailer B. Active Resource C. Railties D. Active Support

Computer Science & Information Technology