S/MIME cryptographic algorithms use __________ to specify requirement level.
A. CAN and MUST
B. SHOULD and CAN
C. SHOULD and MIGHT
D. SHOULD and MUST
D. SHOULD and MUST
Computer Science & Information Technology
You might also like to view...
Excel uses no metadata in its files
Indicate whether the statement is true or false
Computer Science & Information Technology
If a cohort in a distributed transaction has performed only read operations, the two-phase commit protocol can be simplified. When the cohort receives the prepare message, it gives up its locks and terminates its participation in the protocol. Explain why this simplification of the protocol works correctly.
What will be an ideal response?
Computer Science & Information Technology