An administrator receives a security alert that appears to be from one of the company's vendors. The email contains information and instructions for patching a serious flaw that has not been publicly announced. Which of the following can an employee use to validate the authenticity if the email?
A. Hashing algorithm
B. Ephemeral Key
C. SSL certificate chain
D. Private key
E. Digital signature
Answer: A. Hashing algorithm
Computer Science & Information Technology
You might also like to view...
The ________ in Windows 8.1.1 enables you to move quickly between open apps by clicking on one of the thumbnails
A) charms B) Start screen C) app switcher D) lock screen
Computer Science & Information Technology
In Windows, which of the following statements will open the file, InputFile.txt, that is in the root directory on the C: drive?
a. FileReader freader = new FileReader("C:\InputFile.txt"); b. FileReader freader = new FileReader("C:\InputFile\txt"); c. FileReader freader = new FileReader("/c/InputFile.txt"); d. FileReader freader = new FileReader("C:\\InputFile.txt");
Computer Science & Information Technology