Which of the following is used to authenticate asymmetric keys?
A.
Digital signature
B.
MAC Address
C.
Demilitarized zone (DMZ)
D.
Password
Which of the following is used to authenticate asymmetric keys?
Which of the following is used to authenticate asymmetric keys?
A.
Digital signature
B.
MAC Address
C.
Demilitarized zone (DMZ)
D.
Password