The reverse of the asymmetric encryption process yields ____.

A. digital signatures
B. certificate authorities
C. DES
D. a Rijndael round

Answer: A

Computer Science & Information Technology

You might also like to view...

When you have a message that requires urgent attention, you can send the message with a(n) ____________________ level.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A database, a physical server, and a service are examples of _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology