首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure In
admin
2009-05-15
58
问题
Public Key Infrastructure(PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network(VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store(101)and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip(102)operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store(103)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee(104)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(105)verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
选项
A、interpretation
B、detection
C、encryption
D、translation
答案
C
解析
转载请注明原文地址:https://www.kaotiyun.com/show/nhLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
关于计算机病毒的特征,正确的说法是()。A.计算机病毒只破坏软件系统,不破坏硬件系统B.计算机病毒具有自身复制到其他程序中的特性C.计算机病毒侵入系统后,会立即发作,对计算机造成破坏D.当外界条件满足计算机病毒发作要求时,计算机病毒程序中
利用当前窗口创建一个组名为"TEST”的小型网络,此计算机通过居民区的网关或网络上的其他计算机与Internet连接,需要共享文件夹和网络打印机,计算机描述为“test01”,不创建安装磁盘(提示:出现要求重新启动计算机的对话框即完成此题)。
在Access2003中,允许先创建一个空数据库,再向其中添加表、查询等组件。
Thefollowingscenariowillbeusedforquestions26,27,and28.Trentisthenewmanagerofhiscompany’sinternalsoftwarede
DatabasesoftwareshouldmeettherequirementsofwhatisknownastheACIDtest.Whyshoulddatabasesoftwarecarryoutatomic
Thereareseveraldifferenttypesofsinglesign-onprotocolsandtechnologiesinusetoday.Whattypeoftechnologyisillustra
Theoperationsteamisresponsiblefordefiningwhichdatagetsbackedupandhowoften.Whichtypeofbackupprocessbacksupf
Anellipticcurvecryptosystemisanasymmetricalgorithm.Whatsetsitapartfromotherasymmetricalgorithms?
Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new
Although the bulk of industry resources and energies have focused on developing the fastest(11)or slickest(12), more and more mi
随机试题
下面哪些说法是不正确的?
进行房地产开发项目可行性分析的核心和重点是研究开发项目的经济效益。某房地产开发项目有4个设计方案,其中甲方案净现值FNPV:200万元,投资现值为3000万元,乙方案净现值FNPV:180万元,投资现值为2000万元,丙方案净现值FNPV:150万元,投资
完整性原则是基金信息披露最根本、最重要的原则。()
甲公司向乙公司购买某种国家定价的货物1号,3000元/吨。合同约定由乙于2月5日前交货。2月1日,国家将该货物提价为3200元/吨。乙于2月8日向甲交货,甲只需向乙按合同约定价付款即可。( )
分析下面谱例。要求:(1)标明调式调性。(2)画出曲式结构图示。(3)写出曲式结构名称。(4)第1—4小节与第5—8小节之间使用了哪一种旋律发展手法?
对于国务院反垄断委员会的机构定位和工作职责,下列表述正确的是()。
下列说法正确的是()。Ⅰ.当各边的权值相等时,广度优先遍历算法可用来解决单源最短路径问题Ⅱ.广度优先遍历算法可用来求无向图的所有连通分量Ⅲ.广度优先遍历算法类似于树中的后序遍历算法
如要确认某地区是否存在中小学生课业负担过重的问题,可能有以下三种研究思路:(1)称书包;(2)课堂观察;(3)问卷调查。试分析这三种研究思路的优劣,并提出你自己的研究设想。
做《走出半个人的时代》讲演的是:如果对技能性知识过度崇尚最严重的后果是:
判定下列级数的敛散性:
最新回复
(
0
)