首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
54
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、interpretation
B、detection
C、encryption
D、translation
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/nhLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
通过“开始”菜单中的“所有程序”选项运行应用程序“MicrosoftOfficeWord2003”。
将当前演示文稿发送到MicrosoftOfficeWord。
若当前目录中有一个数据库ABC,则使用下列命令可以打开该数据库,且限制该数据库不可修改。 OPENDATABASEabc(4)
【程序】SETTALKOFFCLEARPUBLICX,YX=5Y=3DOSUB?X,YSETTALKONRETURNPROCEDURESUBPRIVATEXX=1X=X*2+1Y=5RETURNX的输出结
Roberthasbeenaskedtoincreasetheoverallefficiencyofthesalesdatabasebyimplementingaprocedurethatstructuresdata
Anapproachtoalternateoffsitefacilitiesistoestablishareciprocalagreement.Whichofthefollowingdescribestheprosan
Whichofthefollowingbestdescribeshowadigitalsignatureiscreated?
Encryptioncanhappenatdifferentlayersofanoperatingsystemandnetworkstack.WheredoesPPTPencryptiontakeplace?
TheEzonexamnetworkadministratorissuestheping192.168.2.5commandandsuccessfullytestsconnectivitytoahostthathasbe
The task at hand now is to(56)the programmers who still use yesterday’s software technology to solve today’s software problems.
随机试题
耙吸挖泥船开挖软黏土宜选用的耙头是()。
在PowerPoint2003中,不能打印出的内容是__________。()
Ⅱa型高脂蛋白血症患者,通过实验室血脂检查,其血脂变化应为
某一桩基矩形承台的混凝土强度等级为C25,柱截面尺寸0.4m×0.4m,承台尺寸2600mm×2600mm,承台高900mm,h0=850mm,采用9根预制桩,桩截面300mm×300mm,布置如15题图所示,柱传下的竖向荷载设计值F=3600kN,承台采
20世纪70年代末期和80年代初期,国际上已有项目管理信息系统的商业软件,项目管理信息系统现已被广泛地用于业主方和施工方的项目管理。应用项目管理信息系统的主要意义有()。
企业在向客户提供商业信用时应注意()。
9月8日晚,王江镇村民王某(男,65岁)等着过马路时,一辆五菱牌小轿车在行至此路段时突然越过中线,撞向正在路另一边等候过马路的王某。司机撞人后不仅未下车救人,也不顾王某受伤竭力惨叫,反而加速向前逃离,致使被撞倒后挂在车底的王某被司机拖行了6千米。现场示意图
根据智利的法律,所有新房屋的制造都必须按照严格的建筑程序和监督流程进行,建筑物在开建之前___________地必须由专业机构负责设计,因为对房屋防震的要求极高,所以智利在建筑的每一个环节上都___________,不敢有丝毫的____________。依
齐次线性方程组只有零解,则λ应满足的条件是__________.
(05年)微分方程xy’+2y=3xlnx满足y(1)=的解为______.
最新回复
(
0
)