Which of the following encryption methods does PKI typically use to securely protect keys?

A. Elliptic curve
B. Digital signatures
C. Asymmetric
D. Obfuscation

Answer: C. Asymmetric

Computer Science & Information Technology

You might also like to view...

Clicking the ________ button displays the previously visited page

Fill in the blank(s) with correct word

Computer Science & Information Technology

Briefly describe the role of the Zoom tool.

What will be an ideal response?

Computer Science & Information Technology