1.

Which figure implements confidentiality and authentication?

A. a
B. b
C. c
D. d
Answer» B. b


Discussion

No Comment Found