The principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.
A. KDC
B. IETF
C. PKI
D. CRL
C. PKI
Computer Science & Information Technology
You might also like to view...
Using the ________ style allows you to format a letter as outlined in business communications texts.
a. No Spacing b. Bullet c. Business d. Numbered Bullet
Computer Science & Information Technology
The chapter recommends that the smallest font size in a presentation should be ________ points
A) 24 B) 12 C) 14 D) 18
Computer Science & Information Technology