首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
50
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、conformance
B、conference
C、non-repudiation
D、secrecy
答案
C
解析
转载请注明原文地址:https://www.kaotiyun.com/show/BhLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
关于计算机病毒的特征,正确的说法是()。A.计算机病毒只破坏软件系统,不破坏硬件系统B.计算机病毒具有自身复制到其他程序中的特性C.计算机病毒侵入系统后,会立即发作,对计算机造成破坏D.当外界条件满足计算机病毒发作要求时,计算机病毒程序中
在foxpro中,要浏览多个数据库的字段,以下说法中正确的是()并允许进行字段的修改。A.使用listfields命令 B.browsefields命令C.前两者都不对 D.不能在command命令窗口中实现
关闭word的文档后,该文档()。A.存放在内存中B.存放在磁盘中C.存放在外存中D.存放在cache中
以下程序执行后,输出的第一行是 (4) ,第二行是 (5) 。PROGRAMmainIMPLICITNONEINTEGER::nREAL::x,px=3.0;n=2WRITE(,’("VALUE=",F6.2)’)p(x,n)x=2.0
Access2003的“名次表”中的“姓名”与“成绩表”中的“姓名”建立关系,而且两个表中的记录都是唯一的,则这两个表之间的关系是()。
Authorizationcreepistoaccesscontrolswhatscopecreepistosoftwaredevelopment.Whichofthefollowingisnottrueofaut
Thefollowingscenariowillbeusedforquestions26,27,and28.Trentisthenewmanagerofhiscompany’sinternalsoftwarede
Thefollowingscenarioappliestoquestions30,31,and32.Operatingsystemshaveevolvedandchangedovertheyears.Theearli
Youaretheadministratorofadatabasethatcontains64lookuptables.Thesetablesstorestaticdatathatshouldnotchange.H
Although the bulk of industry resources and energies have focused on developing the fastest(11)or slickest(12), more and more mi
随机试题
基本ASCII中共收集的字符有()。
关于危险化学品和农药国际贸易的管制表述错误的是()
Windows的特点包括______。
动态心电图判断抗心律失常药物疗效通常采用ESVEM标准,判定对短阵室性心动过速治疗有效的标准是
肿瘤细胞被细胞毒性T细胞杀伤的关键条件是
背景某煤炭企业,为充分利用自己的资源优势,经合法的报批程序,在自己一大型煤矿附近建设一座大型火力发电厂。用施工总承包的方式进行邀请招投标。由于涉及电力行业,业主邀请A、B等五家具有电力一级施工总承包资质的企业参加投标。因为设计施工图纸尚未提交业主
根据《中华人民共和国海关法》的规定,进出口货物的纳税义务人应当自()向海关缴纳税款。
证券业协会的自律管理体现在保护行业共同利益、促进行业共同发展方面,具体表现为()。
一些摩擦性失业是不可避免的,因为()。
IwasjustaboywhenmyfatherbroughtmetoHarlemforthefirsttime,almost50yearsago.WestayedattheHotelTheresa,a
最新回复
(
0
)