Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
Which security controls are used in public key infrastructure (PKI)? Select three answers.
- Digital certificates
- Multi-factor authentication
- Asymmetric encryption
- Symmetric encryption
Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
Which security controls are used in public key infrastructure (PKI)? Select three answers.