首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
54
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、private keys
B、public keys
C、authentication codes
D、message digests
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/9hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
下列哪些不是浏览万维网(WWW)可使用的工具?______A.httpB.gopherC.ftpD.InternetExplorer
请在幻灯片中插入剪辑管理器中的“telephone”声音,并设置为单击后播放。
()在全国第一个实现了与国际下一代高速网Internet2的互联。
Access2003是一个大型关系数据库管理系统,适合于开发大型管理信息系统。
Access的“名次表”中的“姓名”与“成绩表”中的“姓名"建立关系,而且两个表中的记录都是唯一的,则这两个表之间的关系是()。
【程序说明】使用如下表的数据:SQL语句SELECT部门名称FROM部门表WHERE部门号IN(SELECT部门号,FROM商品表WHERE单价BETWEEN420AND1000)
Thefollowingscenariowillbeusedforquestions26,27,and28.Trentisthenewmanagerofhiscompany’sinternalsoftwarede
Encryptioncanhappenatdifferentlayersofanoperatingsystemandnetworkstack.WheredoesPPTPencryptiontakeplace?
Therearefivedifferentclassesoffire.Eachdependsuponwhatisonfire.Whichofthefollowingisthepropermappingforth
Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new
随机试题
过氧化值是对油脂酸败检测的指标之一。
A.100mlB.400mlC.750mlD.1000mlE.2000ml严重水肿伴少尿患者每日饮水量应小于
在分权组织结构形式下,通常采用()方式来编制责任预算。
杜甫是唐代伟大的现实主义诗人,其诗广泛深刻地反映社会现实,被称为“_______”,杜甫也因此被尊为“_______”,有著名的“三吏”:_______、_______、_______;“三别”:_______、______、________。
建立良好师幼关系的策略有()
适用于多学科、多领域的一般解决问题的策略也被称为()。
李某因诈骗罪被判处有期徒刑2年,缓刑3年。缓刑考验期满后,司法机关查获李某在缓刑考验期内,曾经伙同他人盗窃财物价值达3万元,对李某应当如何处理?()
2015年保险公司原保险保费收入24282.52亿元,同比增长20.00%,比上一年高2.51%。其中,产险业务原保险保费收入7994.97亿元,同比增长10.99%;寿险业务原保险保费收入13241.52亿元,同比增长21.46%;健康险业务原保险保费收
[*]
Schoolspiritisaqualitythatbeginsearlyandoftenlastsalifetime.
最新回复
(
0
)