首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
87
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、messages
B、certificates
C、applets
D、passwords
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/6hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
关闭word的文档后,该文档()。A.存放在内存中B.存放在磁盘中C.存放在外存中D.存放在cache中
关于MIDI文件与WAV文件的叙述正确的是______A.WAV文件比MIDI文件占用的存储空间大B.多个WAV文件可以同时播放,而多个MIDI文件不能同时播放C.MIDI文件的扩展名为.MIDD.MIDI文件的优点是可以重现自然声音
利用桌面快捷菜单创建“扫雷”应用程序的快捷方式,该应用程序的位置在:C:\Windows\system32\winmine.exe。
以Internet为核心的第四代计算机网络,其发展特点为:(),智能与更广泛的应用。
Access2003是一个大型关系数据库管理系统,适合于开发大型管理信息系统。
ACMEInc.paidasoftwarevendortodevelopspecializedsoftware,andthatvendorhasgoneoutofbusiness.ACMEInc.doesnoth
Whatcryptographicattacktypecarriesoutamathematicalanalysisbytryingtobreakamathproblemfromthebeginningandthe
Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new
Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new
随机试题
启动IE浏览器的方法有多种,其中不包括()。
1905年11月,孙中山将同盟会纲领概括为民族、民权、民生三大主义的文章是()
能反映类风湿关节炎病情活动性的临床表现是
关于有效辩护原则,下列哪些理解是正确的?(2015年卷二69题,多选)
询价对象可申请参与初步询价,由主承销商审批是否参加。()
甲公司和乙公司是两家规模相当、产品类似、设在同一地区的小型日化生产企业,属于竞争对手。两家公司都依靠银行借款缓解成长期现金短缺问题,但都因规模小,所以只能以较高利率取得银行借款。为了缓解资金压力,甲、乙两家公司签订协议,决定展开合作,包括建立定期交流机制,
甲股份公司效益一直不错,为提升公司治理现代化,增强市场竞争力并顺利上市,公司决定重金聘请知名职业经理人王某担任总经理。根据公司法律制度的规定,下列表述正确的有()。
浙江省东西和南北的直线距离均为550公里左右。()
2,1,4,6,26,158,()
Alotofpeopleinstinctivelybelieve—withoutreallyknowing—thatpoorreadersarenotespeciallysmart.Anewstudybyrese
最新回复
(
0
)