How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
A . Hash value
B . Private key
C . Digital signature
D . Digital certificate
Answer: D
How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
A . Hash value
B . Private key
C . Digital signature
D . Digital certificate
Answer: D