首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
43
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、conformance
B、conference
C、non-repudiation
D、secrecy
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/BhLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
利用快捷方式向导,在桌面上为应用程序“Word.exe”创建名为“WORD”的快捷方式,该应用程序的位置在“C:\ProgramFiles\MicrosoftOffice\OFFICEll\WINWORD.EXE"。
【程序】**主程序:AAA.PRGSETTALKOFFCLEARK=20Y=30DOBBB?X,YRETURN**子程序:BBB.PRGPRIVATEYX=40Y=50RETURN程序执行后的显示结果为___
【程序】**PROG1.PRGSETTALKOFFPUBLICX,YX=“同学们”Y=“你们好!”?X+YDOSUBPRO?X,Y,ZSETTALKONRETURN**SUBPRO.PRGPRIVATE
【程序】SETTALKOFFCLEARPUBLICX,YX=5Y=3DOSUB?X,YSETTALKONRETURNPROCEDURESUBPRIVATEXX=1X=X*2+1Y=5RETURNX的输出结
Roberthasbeenaskedtoincreasetheoverallefficiencyofthesalesdatabasebyimplementingaprocedurethatstructuresdata
Samplanstoestablishmobilephoneserviceusingthepersonalinformationhehasstolenfromhisformerboss.Whattypeofiden
Whichofthefollowingdoesnotcorrectlydescribeadirectoryservice?
Therearemanydifferenttypesofaccesscontrolmechanismsthatarecommonlyembeddedintoalloperatingsystems.Whichofthe
WhichthreeapproachescanbeusedwhilemigratingfromanIPV4addressingschemetoanIPV6scheme.
IntheimplementationofVLSMtechniquesonanetworkusingasingleClassCIPaddress,whichsubnetmaskisthemostefficient
随机试题
摩尔是表示()。
A.我国实施药品分类管理的指导思想B.我国实施药品分类管理的目标C.我国实施药品分类管理的基本原则D.我国遴选非处方药的指导思想E.我国遴选非处方药的原则
影响混凝土保水性的主要因素是混凝土的()。
某单位会计人员在编制记账凭证时误将9600元记为6900元,并已经入账,月终结账前发现错误,更正时采用划线更正法。()
财产租赁所得的纳税人,应以产权凭证为依据,无产权凭证的,纳税人确定方法为()。
股份有限公司发行股票的溢价收入应计入()。
世界的普遍联系和永恒发展是通过一系列基本环节实现的。联系和发展的基本环节包括()
在考生文件夹下有一个工程文件sjt5.vbp.相应的窗体文件为sjt5.frm,此外还有一个名为datain.txl的文本文件,其内容如下:3243765828129857314253647586
读取二进制文件的函数调用形式为:fiead(buffer,size,count,fp);,其中buffer代表的是()。
HowtoGuessYourAgeItseemstomethattheyarebuildingstaircasessteeperthantheyusedto.Therisersarehigher,or
最新回复
(
0
)