The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

A. ECC B. RSA

C. DSS D. XOR

C. DSS

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a method of controlling the Access user interface?

A) Controlling if the Ribbon will be visible B) Controlling the way users navigate to the database C) Setting a password on the database D) Preventing users from editing certain Access objects

Computer Science & Information Technology

The command to insert an online video into a document is located in the Media group of the Insert tab

Indicate whether the statement is true or false

Computer Science & Information Technology