Digital ____ authenticate the cryptographic key that is embedded in the certificate.
A. logs
B. hashes
C. certificates
D. signatures
Answer: C
Computer Science & Information Technology
You might also like to view...
If you want to see how different interest rates affect a monthly payment, you would use a:
A) two-variable data table. B) table array. C) one-variable data table. D) defined name.
Computer Science & Information Technology
In multimedia authoring systems, multimedia elements and events are often treated as objects that exist in a hierarchical relationship. This relationship is often called as:
a. servant and master b. host and client c. property and modifier d. creator and creature e. parent and child
Computer Science & Information Technology