Q. Today, many Internet businesses and users take advantage of cryptography based onthis approach. (Solved)

1. Public key infrastructure

2. Output feedback

3. Encrypting File System

4. Single sign on

  • a. Public key infrastructure
Subscribe Now

Get All Updates & News