Multiple Choice
____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.
A) Symmetric keys
B) Symmetric encryption algorithms
C) Digital signatures
D) SMTP and IMAP
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: _ is the method used to transfer
Q9: How can an SMTP server be exploited?
Q10: An e-mail message stored on an IMAP
Q11: _, as a technique, is quite similar
Q12: A _ entry permits hackers to take
Q13: Firefox is a browser that is free
Q14: Most corporate mail servers allow third-party mail
Q15: The Morris worm created chaos on the
Q16: Describe the main characteristics of buffer overflow
Q18: _ is commercial or nuisance e-mail with