Digital certificates can be used for each of these EXCEPT _____.
A. to verify the authenticity of the Registration Authorizer
B. to encrypt channels to provide secure communication between clients and servers
C. to verify the identity of clients and servers on the Web
D. to encrypt messages for secure email communications
Answer: A. to verify the authenticity of the Registration Authorizer
Computer Science & Information Technology
You might also like to view...
The array subscript operator [], when overloaded, cannot:
a. Be used with linked list classes. b. Take a float as an operand. c. Take multiple values inside (e.g., [4,8]). d. Take user-defined objects as operands.
Computer Science & Information Technology
Perl provides a built-in security-checking mechanism called ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology