首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
58
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、private keys
B、public keys
C、authentication codes
D、message digests
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/9hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
框架中“可改变大小”的语法是下列哪一项______。A.IMGSRC=URLBORDER=?B.SAMP/SAMPC.ADDRESS/ADDRESSD.FRAMENORESIZE
删除显示在“开始”菜单上的最频繁使用的程序列表中的快捷方式,并使“电子邮件”和“Internet”不显示在“开始”菜单上。
【程序】**PROG1.PRGSETTALKOFFPUBLICX,YX=“同学们”Y=“你们好!”?X+YDOSUBPRO?X,Y,ZSETTALKONRETURN**SUBPRO.PRGPRIVATE
Databasesandapplicationscommonlycarryoutthefunctionthatisillustratedinthegraphicthatfollows.Whichofthefollowi
IfMargeusesherprivatekeytocreateadigitalsignatureonamessagesheissendingtoGeorge,butshedoesnotshoworshar
Whichofthefollowingisacorrectstatementregardingcomputerforensics?
WhatofthefollowingallowssecuritypersonneltochangethefieldofviewofaCCTVlenstodifferentanglesanddistances?
WhenfilesaretransferredbetweenahostandanFTPserver,thedataisdividedintosmallerpiecesfortransmission.Asthese
WhichOSIlayerisassociatedwiththefollowing:Theacknowledgementoftransmissions,sequencing,andflowcontrolacrossane
Avarietyoftoolsisavailabletohelptheanalysttodiscovertheusers’trueneeds.Thesetoolsaregroupedintothreebroadte
随机试题
CO2气体保护水平固定管定位焊时,当管子直径小于()时,可采用两点定位焊。
在网络信息安全的措施中,身份认证是访问控制的基础。()
A、 B、 C、 D、 B
以下哪项不是影响骨折愈合的因素
药典规定对阿司匹林进行碳酸钠液中澄明度检查,为检测杂质
春秋时期第一次公布成文法的活动是指()。
某中型铁路旅客车站内设有集散厅、候车区、售票厅、办公区、设备区、行李与包裹库,其防火分区设置正确的是()。
财政部门在实施会计监督中发现重大违法嫌疑时,可以向被监督单位开立账户的金融机构查询相关情况。()
下列各项中,不属于印花税应税凭证的是()。
模仿法的基本操作程序包括()。
最新回复
(
0
)