An administrator is implementing a security control that only permits the execution of allowed
programs. Which of the following are cryptography concepts that should be used to identify the
allowed programs? (Select two.)

A.
Digital signatures
B.
Hashing
C.
Asymmetric encryption
D.
openID
E.
key escrow
Explanation: