首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
67
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、private keys
B、public keys
C、authentication codes
D、message digests
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/9hLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
以下程序执行后,输出的第一行是 (4) ,第二行是 (5) 。PROGRAMmainIMPLICITNONEINTEGER::nREAL::x,px=3.0;n=2WRITE(,’("VALUE=",F6.2)’)p(x,n)x=2.0
Access2003的“名次表”中的“姓名”与“成绩表”中的“姓名”建立关系,而且两个表中的记录都是唯一的,则这两个表之间的关系是()。
【程序说明】使用如下表的数据:SQL语句SELECT部门名称FROM部门表WHERE部门号IN(SELECT部门号,FROM商品表WHERE单价BETWEEN420AND1000)
Lisahaslearnedthatmostdatabasesimplementconcurrencycontrols.Whatisconcurrency,andwhymustitbecontrolled?
Mirroringofdrivesiswhendataiswrittentotwodrivesatonceforredundancypurposes.Whatsimilartypeoftechnologyissh
TherearetwomainfunctionsthatTrustedPlatformModules(TPMs)carryoutwithinsystemstoday.Whichofthefollowingbestde
Thereareseveralcomponentsinvolvedwithsteganography.Whichofthefollowingreferstoafilethathashiddeninformationin
Thefollowingscenariowillbeusedforquestions30and31.Stephaniehasbeenputinchargeofdevelopingincidentresponsean
WhichoneofthefollowingprotocolsallowstheinformationabouttheconfigurationofanewVLANtobedistributedacrossentir
Developing reliable software on time and within(106)represents a difficult endeavor for many organizations.Usually business solu
随机试题
Atradegroupforliquorretailersputoutapressreleasewithanalarmingheadline:"MillionsofKidsBuyInternetAlcohol,L
诊断恶性肿瘤的主要的形态学依据是
治疗梅毒首选药物为
患儿,男,1岁。3天前发热38.5℃,热退后出现口腔溃疡,哭闹,拒食,流涎。检查见口腔黏膜片状充血,有数十个溃疡,有的互相融合,疮破溃后形成痂壳。最可能的临床诊断是
所有错账更正法,均应由记账人员及相关人员在账簿记录更正处盖章以示负责。()
合同法是调控平等主体之间的( )的法律。
纳税人因销售应税消费品而出租出借包装物收取的押金,其正确的计税方法是()。
A.SellB.poorestC.shunD.perhapsPhrases:A.donot【T13】________itandcallithardnamesB.Itlooks【T1
结合河内塔问题,简述手段—目的分析策略。(河北师范大学)
关于法的价值的基本特征,下列说法错误的是
最新回复
(
0
)