The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

A. HMAC B. XOR

C. RSA D. SHA-1

D. SHA-1

Computer Science & Information Technology

You might also like to view...

A remote user cannot connect to the office via VPN. The user has established Internet connectivity. Which of the following is the MOST likely next step in troubleshooting?

A. Reinstall the VPN client at the remote computer. B. Determine if the VPN service is running at the office. C. Power cycle the VPN concentrator at the office. D. Determine if the user has the correct VPN address and password

Computer Science & Information Technology

In evaluating vendors, which key technology elements should you consider?

What will be an ideal response?

Computer Science & Information Technology