(Which authentication method allows a web service installed on a network operating system to prove its identity to a customer?)
(Which authentication method allows a customer to authenticate to a web service?)
(What type of encryption uses different keys to encrypt and decrypt the message?)
(What is used to randomize the initial value when generating Initialization Vectors (IVs)?)
(Which type of exploit involves looking for different inputs that generate the same hash?)
(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)
(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)