Public-key encryption is based on a ____.

A. message authentication code (MAC)
B. certificate
C. hash value
D. key

Answer: C

Computer Science & Information Technology

You might also like to view...

When Calc is open, you can use the shortcut key Ctrl+c to create a new worksheet

Indicate whether the statement is true or false

Computer Science & Information Technology

The network interface layer of the TCP/IP model defines how the host connects to which network?

What will be an ideal response?

Computer Science & Information Technology