The certificate authority (CA) cryptographically signs a certificate file with its private key. Anyone
can verify the certificate signature with the public key. This is known as:
A.
asymmetric-key encryption.
B.
symmetric-key encryption.
C.
binary-key encryption.
D.
hash encryption.