Which of the following are cryptography concepts that should be used to identify the allowed programs?

An administrator is implementing a security control that only permits the execution of allowed
programs. Which of the following are cryptography concepts that should be used to identify the
allowed programs? (Select two.)

An administrator is implementing a security control that only permits the execution of allowed
programs. Which of the following are cryptography concepts that should be used to identify the
allowed programs? (Select two.)

A.
Digital signatures

B.
Hashing

C.
Asymmetric encryption

D.
openID

E.
key escrow

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *

fourteen − 8 =