I'm a little confused by the wording of the question. Is it asking about the best data source to query, or the one a consultant would recommend? I'll need to re-read it carefully.
I'm pretty sure the distinguishing feature of asymmetric encryption is that it uses distinct keys for encryption and decryption. I'll go with option C.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Shizue
5 months agoSunny
6 months agoLorean
6 months agoRemedios
6 months agoEleni
6 months agoDwight
6 months agoJaney
6 months agoLorrine
6 months agoNida
6 months agoBroderick
6 months agoLatosha
6 months agoNguyet
6 months agoMerrilee
6 months ago