Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
Authentication
Secure key-exchange mechanisms
Public Web site access
Data-integrity checking
Sneaker net
Submit