The principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.

A. KDC
B. IETF
C. PKI
D. CRL

C. PKI

Computer Science & Information Technology

You might also like to view...

Using the ________ style allows you to format a letter as outlined in business communications texts.

a. No Spacing b. Bullet c. Business d. Numbered Bullet

Computer Science & Information Technology

The chapter recommends that the smallest font size in a presentation should be ________ points

A) 24 B) 12 C) 14 D) 18

Computer Science & Information Technology