首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
88
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、messages
B、certificates
C、applets
D、passwords
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/6hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
设置过滤器时,应先选择database菜单中的()选项。A.setupB.browseC.appendD.copyto
请在幻灯片中插入剪辑管理器中的“telephone”声音,并设置为单击后播放。
Access2003中不包含内置函数,用户必须手动输入。
在每一个Access数据库中,可以有多个表、查询、窗体、报表、页、宏和模块。
Thereareseveraldifferenttypesofdatabases.Whichtypedoesthegraphicthatfollowsillustrate?
Whatcryptographicattacktypecarriesoutamathematicalanalysisbytryingtobreakamathproblemfromthebeginningandthe
Refertotheexhibit.TheBranchrouterdisplaysknowledgeofaroutetonetwork172.16.0.0/16.Theactualnetworknumberathea
Refertothetopologyandrouterconfigurationshowninthegraphic.AhostontheLANisaccessinganFTPserveracrosstheInt
Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new
Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new
随机试题
A.别络B.经别C.浮络D.经筋
属于H2受体阻滞药的是主要用于治疗内耳眩晕症的是
A、孙思邈B、白求恩C、张仲景D、希波克拉底E、杨泉“夫医者,非仁爱之士不可托也,非聪明达理不可任也,非廉洁淳良不可信也。”是说我国古代医生择徒甚严,此话出自
A.用药及反应发生时间顺序合理;停药以后反应停止,或迅速减轻或好转(根据机体免疫状态,某些ADR反应可出现在停药数天以后);再次使用,反应再现,并可能明显加重(即激发试验阳性);同时有文献资料佐证;并已排除原患疾病等其他混杂因素影响B.用药与反应发生时间
凡是三栏式账簿在摘要栏和借方科目之间均有“对方科目”。()
下列不属于风险缓释的措施的是()。
公共秩序管理部门的主要职责范围是:()。
《导游人员管理条例》第十三条第三款规定,遇紧急情形时导游人员依法享有调整或变更接待计划的权利。导游人员行使此权利时应当特别注意以下()限制条件。
我国对农业进行社会主义改造所遵循的原则是()。
面向对象程序设计思想的主要特征中不包括
最新回复
(
0
)