Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
A.
Authentication
B.
Secure key-exchange mechanisms
C.
Public Web site access
D.
Data-integrity checking
E.
Sneaker net
Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
A.
Authentication
B.
Secure key-exchange mechanisms
C.
Public Web site access
D.
Data-integrity checking
E.
Sneaker net