The public key is used to perform which of the following? (Select THREE).
A.
Validate the CRL
B.
Validate the identity of an email sender
C.
Encrypt messages
D.
Perform key recovery
E.
Decrypt messages
F.
Perform key escrow
The public key is used to perform which of the following? (Select THREE).
The public key is used to perform which of the following? (Select THREE).
A.
Validate the CRL
B.
Validate the identity of an email sender
C.
Encrypt messages
D.
Perform key recovery
E.
Decrypt messages
F.
Perform key escrow