
It-essentials v7.0 Chapter 13 Exam Answers
16 October, 2019
IT Essentials v7.0
It-essentials v7.0 Chapter 13 Exam Answers 1. Which two items are used in asymmetric encryption? (Choose two.) a token a DES key a private key * a public key * a TPM 2. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose …