What is used to provide authentication of the website and can also be used to successfully authenticate keys used for data encryption?
Which of the following should an IS auditor review to determine user permissions that have been granted for a particular resource?