What are the three variations of the distributed trust model?

What will be an ideal response?


There are three variations of this model:
* Fully peer architecture-This configuration results when each of the hierarchies in the model is a shallow, trusted-issuer hierarchy. All peer trust anchors are effectively independent with no subordinates.
* Full-treed architecture-This configuration results when each of the hierarchies is a multilevel hierarchy with each peer anchor containing one or more subordinates.
* Hybrid architecture-This configuration results when a mix of shallow and multilevel hierarchies are present in the model.

Computer Science & Information Technology

You might also like to view...

What is Server-side languages?

What will be an ideal response?

Computer Science & Information Technology

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user.   How can you best solve this issue without losing data in the folder?

A. Take ownership of the folder and then change permissions. B. Disable permission inheritance and explicitly assign the new permissions. C. Enable permission inheritance so the new permissions are inherited from the parent folder. D. Delete the folder and re-create it. Then assign the new permissions.

Computer Science & Information Technology

Classification categories must be __________ and mutually exclusive.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The big advantage of frequency division multiplexing over synchronous TDM is the lower noise due to the use of digital signals during transmission.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology