What are the three variations of the distributed trust model?
What will be an ideal response?
There are three variations of this model:
* Fully peer architecture-This configuration results when each of the hierarchies in the model is a shallow, trusted-issuer hierarchy. All peer trust anchors are effectively independent with no subordinates.
* Full-treed architecture-This configuration results when each of the hierarchies is a multilevel hierarchy with each peer anchor containing one or more subordinates.
* Hybrid architecture-This configuration results when a mix of shallow and multilevel hierarchies are present in the model.
You might also like to view...
Digital signatures are used for which of the following?
A) To encrypt a message B) To ensure message confidentiality C) To prove the identity of the sender of the message D) To ensure the message cannot be opened by anyone but the sender
In a(n) ____ loop, the loop condition is evaluated before the instructions within the loop are processed.
A. pretest B. posttest C. inline test D. execute
A member function should be static if it does not access __________ class members.
Fill in the blank(s) with the appropriate word(s).
Modify the INSTALLED SOFTWARE TRANSACTION, which is used to update the SOFTWARE MASTER and to produce the SOFTWARE INSTALLATION LISTING. Delete the TITLE and VERSION NUMBER, because they may be obtained from the SOFTWARE MASTER and are redundant keying. Add the HARDWARE INVENTORY NUMBER, specifying the installation computer. Delete the CAMPUS LOCATION and ROOM LOCATION, because they are elements of the installation computer.
What will be an ideal response?