Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.
- digital certificate
- access token
- digital signature
- access key
Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.