Answer the following statements true (T) or false (F)
1) In a public-key algorithm, one key is used for both encryption and decryption.
2) Digital certificates are intended to be used indefinitely.
3) Secure Sockets Layer protects data stored on a merchant’s server.
4) Digital signatures can provide undeniable proof of the author of a document.
5) In a network of 10 users communicating using public-key cryptography, only 10 keys are needed in total.
1) F
2) F
3) F
4) F
5) F
You might also like to view...
What is the primary difference between network policy conditions and network policy constraints?
What will be an ideal response?
In the weighted point evaluation method, the product that is usually selected is the one with ____.
A. the lowest overall score B. the highest overall score C. the score closest to the benchmark D. the score with the lowest cost