Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity?

A. CHAP
B. EAP
C. PKI
D. Kerberos

Answer: C. PKI

Computer Science & Information Technology

You might also like to view...

Select the attributes that are used in the area element to configure a clickable area on an image map

a. src, left, top, alt b. href, left, top, alt c. href, coords, shape, alt d. src, coords, shape, alt

Computer Science & Information Technology

?OneNote saves your notes __________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology