which of the following controls allows the device receiving the communications to verify that the received communications have not been altered in transit?
A perpetrator looking to gain access to and gather information about encrypted data being transmitted over the network would use:
Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public key of the: