Which of the following will enable a customer to authenticate an online Internet vendor?
A. Vendor signs a reply using a hash function and the customer’s public key.
B. Customer encrypts an order using the vendor’s public key.
C. Customer verifies the vendor’s certificate with a certificate authority (CA).
D. Vendor decrypts incoming orders using its own private key.
A. Vendor signs a reply using a hash function and the customer’s public key.
B. Customer encrypts an order using the vendor’s public key.
C. Customer verifies the vendor’s certificate with a certificate authority (CA).
D. Vendor decrypts incoming orders using its own private key.