首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
37
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、messages
B、certificates
C、applets
D、passwords
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/6hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
关于计算机病毒的特征,正确的说法是()。A.计算机病毒只破坏软件系统,不破坏硬件系统B.计算机病毒具有自身复制到其他程序中的特性C.计算机病毒侵入系统后,会立即发作,对计算机造成破坏D.当外界条件满足计算机病毒发作要求时,计算机病毒程序中
在foxpro中,要浏览多个数据库的字段,以下说法中正确的是()并允许进行字段的修改。A.使用listfields命令 B.browsefields命令C.前两者都不对 D.不能在command命令窗口中实现
Internet网络通信使用的协议是()。
【程序】**PROG1.PRGSETTALKOFFPUBLICX,YX=“同学们”Y=“你们好!”?X+YDOSUBPRO?X,Y,ZSETTALKONRETURN**SUBPRO.PRGPRIVATE
Inaredundantarrayofinexpensivedisks(RAID)systems,dataandparityinformationarestripedoverseveraldifferentdisks.
Johnandhisteamareconductingapenetrationtestofaclient’snetwork.Theteamwillconductitstestingarmedonlywithkno
DifferentthreatsneedtobeevaluatedandrankedbasedupontheirseverityofbusinessriskwhendevelopingaBCP.Whichrankin
CPUsandoperatingsystemscanworkintwomaintypesofmultitaskingmodes.Whatcontrolsaccessandtheuseofsystemresource
Whichofthefollowingattackscanbebestpreventedbylimitingtheamountofelectricalsignalsemittedfromacomputersystem
TheEzonexamnetworkadministratorissuestheping192.168.2.5commandandsuccessfullytestsconnectivitytoahostthathasbe
随机试题
A.腰椎结核B.腰椎骨折C.腰椎骨关节炎D.腰椎间盘突出症E.颈椎病X线显示椎体边缘破坏,椎间隙变窄是
男,5岁。右侧可复性腹股沟斜疝,最佳手术治疗方法应选择
急性肾功能衰竭。高钾血症患者,心率40次/分应首先采取的治疗措施是
受到高热、磨擦、冲击后能产生剧烈反应而发生大量气体和热量,引起爆炸的化学药品是具有强烈腐蚀性,甚至引起燃烧、爆炸和杀伤性药品是
施工现场内的下列场所应配置灭火器()。
互联网好比一个复杂多样的虚拟世界,每台联网主机上的信息又构成了一个微观虚拟世界,若在某主机上可以访问本主机的信息,则称该主机相通于自身,若主机X能通过互联网访问主机Y的信息,则称X相通于Y。已知代号分别为甲、乙、丙、丁的四台联网主机有如下信息:(1)甲主
请用所给的实验材料和用具,设计实验来验证哺乳动物的蔗糖酶和淀粉酶的催化作用具有专一性,要求完成实验设计、补充实验步骤、预测实验结果、得出结论,并回答问题。实验材料与用具:适宜浓度的蔗糖酶、唾液淀粉酶、蔗糖、淀粉4种溶液,斐林试剂、试管、37℃恒温水浴锅、沸
公安机关及其人民警察(),是构成公安赔偿责任的必要条件。
AlltherecentnewsonAIDSisbad.ThedeathofRockHudson【C1】______publicconcernaboutthe【C2】______almosttothepointofp
A、 B、 C、 C
最新回复
(
0
)