Digital certificates can be used for each of these EXCEPT _____.

A. to verify the authenticity of the Registration Authorizer
B. to encrypt channels to provide secure communication between clients and servers
C. to verify the identity of clients and servers on the Web
D. to encrypt messages for secure email communications

Answer: A. to verify the authenticity of the Registration Authorizer

Computer Science & Information Technology

You might also like to view...

The array subscript operator [], when overloaded, cannot:

a. Be used with linked list classes. b. Take a float as an operand. c. Take multiple values inside (e.g., [4,8]). d. Take user-defined objects as operands.

Computer Science & Information Technology

Perl provides a built-in security-checking mechanism called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology