CheckPoint Exam Questions

If a digital signature is used to achieve both data-integrity checking and verification of sender, d

If a digital signature is used to achieve both data-integrity checking and verification of sender, digital
signatures are only used when implementing:

A.
A symmetric-encryption algorithm

B.
CBL-DES

C.
Triple DES

D.
An asymmetric-encryption algorithm