Which of the following are appropriate uses of asymmetric encryption?

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

A.
Authentication

B.
Secure key-exchange mechanisms

C.
Public Web site access

D.
Data-integrity checking

E.
Sneaker net



Leave a Reply 0

Your email address will not be published. Required fields are marked *