Digital ____ authenticate the cryptographic key that is embedded in the certificate.

A. logs
B. hashes
C. certificates
D. signatures

Answer: C

Computer Science & Information Technology

You might also like to view...

If you want to see how different interest rates affect a monthly payment, you would use a:

A) two-variable data table. B) table array. C) one-variable data table. D) defined name.

Computer Science & Information Technology

In multimedia authoring systems, multimedia elements and events are often treated as objects that exist in a hierarchical relationship. This relationship is often called as:

a. servant and master b. host and client c. property and modifier d. creator and creature e. parent and child

Computer Science & Information Technology