Which of the following is used to authenticate asymmetric keys?
A.
Digital signature
B.
MAC Address
C.
Password
D.
Demilitarized zone (DMZ)
Explanation:
Which of the following is used to authenticate asymmetric keys?
Which of the following is used to authenticate asymmetric keys?
A.
Digital signature
B.
MAC Address
C.
Password
D.
Demilitarized zone (DMZ)
Explanation: