The security administrator generates a key pair and sends one key inside a request file to a third party. The
third party sends back a signed file. In this scenario, the file sent by the administrator is a:
You must be logged in to post a comment.