Gloryreak2236 Gloryreak2236 27-02-2024 Computers and Technology contestada What method is Bob using to reply confidentially to a message from Alice?a. Asymmetric encryptionb. Symmetric encryptionc. Public key infrastructured. Digital certificates