首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
66
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、messages
B、certificates
C、applets
D、passwords
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/6hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
ISO/IEC27000ispartofagrowingfamilyofISO/IECinformationsecuritymanagementsystems(ISMS)standards.Itcomprisesinfo
Whichofthefollowingisnotacharacteristicofacompanywithasecuritygovernanceprograminplace?
Authorizationcreepistoaccesscontrolswhatscopecreepistosoftwaredevelopment.Whichofthefollowingisnottrueofaut
Thereareseveraltypesofattacksthatprogrammersneedtobeawareof.Whatattackdoesthegraphicthatfollowsillustrate?
Whattypeoftechnologyisrepresentedinthegraphicthatfollows?
TwocommonlyusednetworkingprotocolsareTCPandUPD.Whichofthefollowingcorrectlydescribesthetwo?
WidgetsInc.’ssoftwaredevelopmentprocessesaredocumentedandtheorganizationiscapableofproducingitsownstandardofso
Areceivinghosthasfailedtoreceiveallofthesegmentsthatitshouldacknowledge.Whatcanthehostdotoimprovetherelia
论ERP的开发与应用ERP(EnterpriseResourcesPlanning,企业资源计划)是二种系统化的管理平台,它建立在信息技术基础上,利用现代企业的先进管理思想,全面地集成企业的信息资源,并为企业提供决策、计划、控制与经营业绩评估。
Developing reliable software on time and within(106)represents a difficult endeavor for many organizations.Usually business solu
随机试题
称量法测定黄铁矿中硫的质量分数,称取样品0.3853g,下列结果合理的是()。
频带传输系统与基带传输系统的区别在于在发送端增加了调制,在接收端增加了解调,以实现信号频带的搬移。()
甲、乙结婚的第10年,甲父去世留下遗嘱,将其拥有的一套房子留给甲,并声明该房屋只归甲一人所有。下列哪一项表述是正确的()
CT平扫无法显示的是
A.温和灸B.温针灸C.无瘢痕灸D.雀啄灸E.温灸器灸将艾条燃着的一端与施灸部位并不固定在一定的距离,而是一上一下的移动施灸称为
[1995年第157题]关于居住区用地界限的划分.下列哪项不正确?
提前支取的定期储蓄存款,支取部分()。
甲、乙两部参加军事演习。甲部从大本营以60千米/小时的速度往西行进,乙部晚半小时由大本营往东行进,速度比甲部慢。两部同时接到军令紧急集合,集合地位于大本营正北某处。此时两部所在位置与集合地恰好构成有一角为30度的直角三角形。若两部同时调整方向往集合地行军,
2012年1~6月.江西省十大战略性新兴产业固定资产投资(以下简称“十大产业投资”)总量突破千亿元,达1112.52亿元,比上年同期增长24.0%,占全省固定资产投资(计划投资500万元及以上项目固定资产投资,下同)的23.5%;对全省固定资产投资增长的贡
thehighestmountainsasbungeejumpingbecuredtoseekdangerA.diseasescouldnoteasily【T13】______,andlifewasaconti
最新回复
(
0
)