December 23, 2021 by Admin
Which of the following will enable a customer to authenticate an online Internet vendor?
- Vendor signs a reply using a hash function and the customer’s public key.
- Customer encrypts an order using the vendor’s public key.
- Customer verifies the vendor’s certificate with a certificate authority (CA).
- Vendor decrypts incoming orders using its own private key.