Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
A . PKI uses an independent administrator to manage the public key.
B . The public key is authenticated against reliable third-party identification.
C . PKI’s public accessibility allows it to be used readily for e-commerce.
D . The private key uniquely authenticates each party to a transaction.
Answer: D
Latest IIA-CIA-Part3 Dumps Valid Version with 402 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments
                 
	