CheckPoint Exam Questions

Which of the following is the solution to this problem?

One of the problem of the asymmetric encryption is proving that a public key is authentic and has not been tampered with. Which of the following is the solution to this problem?
Select all the correct answers.

A.
Pretty Good Privacy (PGP)

B.
Universal key encryption

C.
Public-key infrastructure (PKI)

D.
Digital Signature

E.
Privatekey encryption