What are the most common approaches to provide PKI client functionalities?
What will be an ideal response?
Two approaches are commonly used to provide client functionalities:
Integrated PKI-aware code. PKI functions can be fully integrated within a particular application such as a Web browser. In this case, the browser has all the build-in functions for requesting a certificate, storing the certificate, checking revocation information, and exporting PKI-related data in different formats.
Stand-alone PKI client software. This approach provides true infrastructure function by implementing and providing PKI client services outside every application. The application connects to this client software through standard entry points, as in any infrastructure, and taps into all the security services that PKI can provide.
You might also like to view...
Answer the following statements true (T) or false (F)
1. For network based user authentication the most important methods involve cryptographic keys and something the individual possesses, such as a smart card. 2. There are a variety of problems including dealing with false positives and false negatives, user acceptance, cost, and convenience with respect to biometric authenticators. 3. Any timestamp based procedure must allow for a window of time sufficiently large enough to accommodate network delays yet sufficiently small to minimize the opportunity for attack. 4. An e-mail message should be encrypted such that the mail handling system is not in possession of the decryption key. 5. Because there are no potential delays in the e-mail process, timestamps are extremely useful.
A used car dealer wants you to develop a website to display his vehicles. The inventory changes daily. Explain what you would include on the site and how you would update it daily.
What will be an ideal response?
____ refers to using artwork on one layer to mask the artwork on the layer above it.
A. Clipping B. Kerning C. Masking D. Basing
When a new master file is created and then later used as the current master file it is referred to as a
a) transaction file b) batch file c) turnaround file d) detail file