PKI is a method of user authentication which uses which of the following?
A.
Various router commands
B.
Access control lists
C.
Certificate services
D.
A RADIUS server
Explanation:
A PKI (public key infrastructure) enables users of a basically unsecure public network such as the
Internet to securely and privately exchange data and money through the use of a public and a
private cryptographic key pair that is obtained and shared through a trusted authority. The public
key infrastructure provides for a digital certificate that can identify an individual or an organization
and directory services that can store and, when necessary, revoke the certificates. Although the
components of a PKI are generally