首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
36
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、conformance
B、conference
C、non-repudiation
D、secrecy
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/BhLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
关闭word的文档后,该文档()。A.存放在内存中B.存放在磁盘中C.存放在外存中D.存放在cache中
打开桌面上【MicrosoftOfficeword2007】快捷方式。
以下程序执行后,输出的第一行是 (6) ,第二行是 (7) ,第三行是 (8) 。PROGRAMmainIMPLICITNONEINTEGER::a(3,2),b(2,3),c(3,3),i,j,k,tmpa=RESHAPE((/1,2,
在Internet上传输的信息至少遵循三个协议:网际协议、传输协议和()。
Thefollowingscenariowillbeusedforquestions26,27,and28.Trentisthenewmanagerofhiscompany’sinternalsoftwarede
Emilyislisteningtonetworktrafficandcapturingpasswordsastheyaresenttotheauthenticationserver.Sheplanstouseth
BrandycouldnotfigureouthowSamgainedunauthorizedaccesstohersystem,sincehehaslittlecomputerexperience.Whichof
Therearecommoncloudcomputingservicemodels.______usuallyrequirescompaniestodeploytheirownoperatingsystems,applica
Therearemanydifferenttypesofaccesscontrolmechanismsthatarecommonlyembeddedintoalloperatingsystems.Whichofthe
Greatcaremustbetakentocapturecluesfromacomputerordeviceduringaforensicsexercise.Whichofthefollowingdoesnot
随机试题
女性,29岁,诊断为肥厚型心肌病。下列哪项不符合其诊断
化妆品中含大量Bi、Al、Ca时,用原子吸收光谱法测定会干扰测铅的结果,这是因为
进行工程项目设计审查主要是从()等方面对工程设计方案进行审核。
我国城乡规划法规体系中的基本法是()
机场目视助航工程专业承包企业资质等级为一级的标准有()。
在MRPⅡ上能解决计划、物流、资金流等“如果怎样,将会怎样”的问题,这属于MRPⅡ结构()特点。
关于可转换债券,以下表述不正确的有()。
在激进型融资政策下,下列结论成立的是()。
TheactorwithwhomIplayedthescene______formebeautifully,whisperingtheopeningwordsofeachofmylines,asdidothers
ItisknowntousthatEnglishisnotasoldasChinese,butitiswidelyusedbymostpeopleallovertheworld.Englishspeake
最新回复
(
0
)