Which of the following can be used as a keying method?
A) Public key encryption for confidentiality
B) MS-CHAP
C) Both A and B
D) None of the above
Answer: A
Business
You might also like to view...
List three examples of order-taking elements in order entry
What will be an ideal response?
Business
Even though it is a high-level programming language, Java still suffers from buffer overflows because it permits more data to be saved into a buffer than it has space for
Indicate whether the statement is true or false.
Business