web analytics

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)

 Free Free Download The Exam Relevant Study Guide

Send Via Email (Need Reachable Email ID)

Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
A. Authentication
B. Secure key-exchange mechanisms
C. Public Web site access
D. Data-integrity checking
E. Sneaker net
Answer: ABD

 Free Free Download The Exam Relevant Study Guide

Send Via Email (Need Reachable Email ID)