Which of the following are cryptography concepts that should be used to identify the allowed programs?

An administrator is implementing a security control that only permits the execution of allowed programs.
Which of the following are cryptography concepts that should be used to identify the allowed programs?
(Select two.)

An administrator is implementing a security control that only permits the execution of allowed programs.
Which of the following are cryptography concepts that should be used to identify the allowed programs?
(Select two.)

A.
Digital signatures

B.
Hashing

C.
Asymmetric encryption

D.
openID

E.
key escrow



Leave a Reply 1

Your email address will not be published. Required fields are marked *

three − 3 =


IThelper

IThelper

A and B make sense.