PrepAway - Latest Free Exam Questions & Answers

Tag: Briefing CISSP (update December 20th, 2017)

Briefing CISSP: Certified Information Systems Security Professional (update December 20th, 2017)

The "Infrastructure" of this methodol…

Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The originator encrypts
information using the intended recipient’s “public” key in order to get confidentiality of the data being sent. The
recipients use their own “private” key to decrypt the information. The “Infrastructure” of this methodology
ensures that:


Page 98 of 129« First...102030...96979899100...110120...Last »