Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity?
A. CHAP
B. EAP
C. PKI
D. Kerberos
Answer: C. PKI
Computer Science & Information Technology
You might also like to view...
Select the attributes that are used in the area element to configure a clickable area on an image map
a. src, left, top, alt b. href, left, top, alt c. href, coords, shape, alt d. src, coords, shape, alt
Computer Science & Information Technology
?OneNote saves your notes __________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology