In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?
An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:
An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:
Which of the following BEST describes the role of a directory server in a public key infrastructure (PKI)?