首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
34
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、conformance
B、conference
C、non-repudiation
D、secrecy
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/BhLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
【程序】**PROG1.PRGSETTALKOFFPUBLICX,YX=“同学们”Y=“你们好!”?X+YDOSUBPRO?X,Y,ZSETTALKONRETURN**SUBPRO.PRGPRIVATE
Whichofthefollowingisthebestdescriptionofacomponent-basedsystemdevelopmentmethod?
Thereareseveraldifferenttypesofsinglesign-onprotocolsandtechnologiesinusetoday.Whattypeoftechnologyisillustra
Encryptioncanhappenatdifferentlayersofanoperatingsystemandnetworkstack.WheredoesPPTPencryptiontakeplace?
Privacyisbecomingmorethreatenedastheworldreliesmoreandmoreontechnology.Thereareseveralapproachestoaddressing
YouaretheadministratorofaSQLServer2000computer.Theservercontainsadatabasenamedsales.Youneedtochangetheway
AfterconnectingaPCtoanavailableportonaswitch,youfindthatthePCcannotaccessanyoftheresourcesontheLAN.No
AfterworkingallnightandsuccessfullyconfiguringaCiscorouterfortheEzonexamnetworkyousaveyourchangesonthestartu
Developing reliable software on time and within(106)represents a difficult endeavor for many organizations.Usually business solu
Although the bulk of industry resources and energies have focused on developing the fastest(11)or slickest(12), more and more mi
随机试题
体内哪些部位血管对肾上腺素的缩血管作用反应强烈:
改革开放以来,我国经济快速增长,但是受亚洲金融危机影响,经济出现了许多新问题,其中之一就是1998--2002年的物价问题。该时期物价指数分别为。根据以上资料,回答下列问题:为了治理这种物价问题,可以采取的财政政策措施有()。
泰山石刻是中国文化史中的一朵奇葩,其摩崖石刻居各名山之最。()
属于我国四大菜系的广东风味的菜肴是()。
材料:在进行“爱护植被,绿化祖国”内容的教学时,某位教师制订了如下教学目标。A.使学生了解我国主要的植被类型及特点。B.使学生知道我国植被面临的主要问题。C.让学生尝试设计校园绿化方案。D.通过了解我国植被
我国现行《宪法》规定下列中央国家机关中连续任职不得超过两届的有()。
Manystudentsfeelitthatapopularteachermustbekindandeasy-going.【M1】______Heandsheshouldmaketheclassvery【M2】___
雕版印刷术在北宋时发展迅速,广泛应用于刻印书籍。国子监刻印的书,后世称为();政府机构刻印的书,统称为();民间书坊刻印的书称为()。
唐高宗李治的妹夫房遗爱谋反案发犯“十恶”罪。依《永徽律疏》规定,对房遗爱()。
下列四类网络产品中,______可既具有中继功能,又具有桥接功能。
最新回复
(
0
)