首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
67
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、messages
B、certificates
C、applets
D、passwords
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/6hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
windows98的“任务栏”上存放的是()
利用“用户帐户”窗口,将计算机管理员的用户“Computeruser”的名称改为“Creator”,将图片更改为G盘根目录下“可爱的动物”文件夹中的“骏马.jpg”,将帐户类型改为“受限”(请按顺序操作)。
请用选中的Word表格数据创建“MicrosoftGraph”图表。
WhichofthefollowingbestdescribestherelationshipbetweenCobiTandITIL?
Mirroringofdrivesiswhendataiswrittentotwodrivesatonceforredundancypurposes.Whatsimilartypeoftechnologyissh
YouconfigureanHPJetDirectprintdeviceassownintheNetworkDiagramexhibit.Youwanttocreateandshareaprinterat
TheEzonexamnetworkadministratorneedstodeterminewhatLANdevicestoinstallontheEzonexamnetwork.Whataretwoadvantag
YouhaveaclassCnetwork,andyouneedtodesignitfor5usablesubnetswitheachsubnethandlingaminimumof18hostseach.
WhydoesthedatacommunicationindustryusethelayeredOSIreferencemodel?
Developing reliable software on time and within(106)represents a difficult endeavor for many organizations.Usually business solu
随机试题
吴某虽然只有9周岁,但身高已经超过1.5米春节后独自用“压岁钱”买了一辆价值600元的自行车对此,下列说法中,不正确的是()
企业计提的下列资产减值准备,不得转回的是()。
位于经济特区的某中外合资家电生产企业,原适用15%的所得税优惠税率,2007年成立,2008年为开始获利年度,执行新会计准则。2011年发生以下业务:(1)销售A产品25000台.每台不含税单价2000元,每台销售成本1500元。(2)出租设备收人30
根据所给材料回答问题。2007年5月,摄影师张永彬与模特方岑签订《人像艺术摄影协议》约定:“本次人像摄影所产生作品的著作权属于张永彬。作品供人像摄影等专业期刊发表及公开展出。”依此约定,张永彬为方岑拍摄了多组人像艺术摄影照片,并交方岑留存一套。
某校开学时组织新生进行了体检,班主任郭某偶然发现学生唐某患有先天性心脏病。在随后开展的“健康成长”的班会上,郭某未经唐某的同意,以唐某的疾病为例,鼓励全班学生热爱生活,健康成长。下列关于郭某的行为说法正确的是()。
软件风险是指在软件开发过程中面临的一些不确定性和可能造成的损失。软件风险大致可以分为3类:项目风险、技术风险和商业风险。下列叙述中,(51)属于商业风险。
彩色CRT显示器主要由视频放大驱动电路、行扫描电路______、高压电路、显像管和机内直流电源组成。
3下列语句中正确的是()。
Periodicallyinhistory,therecomeperiodsofgreattransitioninwhichworkchangesitsmeaning.Therewasatime,perhaps10,
ThekeytotheindustrializationofspaceistheU.S.spaceshuttle.【C1】______it,astronautswillacquireaworkhousevehicle【C
最新回复
(
0
)