Which of the following is used to authenticate asymmetric keys?

Which of the following is used to authenticate asymmetric keys?

Which of the following is used to authenticate asymmetric keys?

A.
Digital signature

B.
MAC Address

C.
Password

D.
Demilitarized zone (DMZ)

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *