Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.

Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz | 

Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.

  • digital certificate
  • access token
  • digital signature
  • access key

 

Leave a Comment