I'm a little confused by the wording of the question. Is it asking about the best data source to query, or the one a consultant would recommend? I'll need to re-read it carefully.
I'm pretty sure the distinguishing feature of asymmetric encryption is that it uses distinct keys for encryption and decryption. I'll go with option C.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Shizue
4 months agoSunny
4 months agoLorean
4 months agoRemedios
4 months agoEleni
5 months agoDwight
5 months agoJaney
5 months agoLorrine
5 months agoNida
5 months agoBroderick
5 months agoLatosha
5 months agoNguyet
5 months agoMerrilee
5 months ago