A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication.

a. disaster recovery firm
b. DES company
c. directory company
d. certificate authority
e. fingerprint advisory board

Answer: d. certificate authority

Computer Science & Information Technology

You might also like to view...

The process of retrieving image data from unallocated or slack space is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

____________________ refers to the act of breaking into a computer or network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology