You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following
describes the function of the asymmetric-key-encryption algorithm used?
A.
It encrypts the symmetric key.
B.
It encrypts all of the data.
C.
It encrypts the hash code used for data integrity.
D.
It encrypts the X.509 key.