ECCouncil Exam Questions

Which of the following is used to authenticate asymmetric keys?

Which of the following is used to authenticate asymmetric keys?

A.
Digital signature

B.
MAC Address

C.
Password

D.
Demilitarized zone (DMZ)

Explanation: