None of the listed options is correct.
Public Key Infrastructure (PKI) uses cryptographic algorithms at multiple levels to provide secure communication and trust among parties. At the core of PKI is the use of public key algorithms, also known as asymmetric cryptography, which use a pair of keys, a public key and a private key, for encryption and decryption.
Therefore, the correct answer is: PKI uses public key algorithms such as RSA (with key sizes of at least 2048-bit strength or higher), hash functions, and symmetric key algorithms such as AES (with key sizes of 128 bits or higher).
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.312-50 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Novmejst
6 months, 2 weeks ago