Answer A is correct. In a decentralized key-management scheme, the user creates both the private and public key and then submits the public key to the CA to allow it to apply its digital signature after it has authenticated the user. Answer B is incorrect because centralized key management allows the organization to have complete control over the creation, distribution, modification, and revocation of the electronic credentials that it issues. Answers C and D are incorrect because they are nonexistent terms.
Answer C is correct. Transport Layer Security (TLS) is a network protocol that replaces Secure Sockets Layer (SSL) to provide security communication security over networks. Answer A is incorrect, ...