Documents protected by XML security may be signed or encrypted long before anyone can predict
who will be the ultimate recipients. What measures are taken to ensure that the latter have access
to the algorithms used by the former?
What will be an ideal response?
The algorithms used are specified within the XML document itself, so that recipients know which one was
used for a particular task, e.g encryption or digital signing. In addition, the standard states the algorithms that
must be available to any implementation of XML encryption and XML digital signature. The creator of such
documents should be sure to use one of the standard algorithms.
You might also like to view...
Which of the following is not a metric used in dynamic routing protocols?
a. Hop count b. Cost c. Runs d. Ticks
(Printing Dates in Various Formats) Dates are printed in several common formats. Write a script that reads a date from an HTML form and creates a Date object in which to store that date. Then, use the various methods of the Date object that convert Dates into strings to display the date in several formats.
What will be an ideal response?
Melanie is writing an article for the school newspaper. Her editor assigned her a maximum length; however, Melanie has some strong opinions she would like to express.While writing her column in a Word document, Melanie will know if she is within the assigned length of her column by checking the word count indicator on the ____.
A. title bar B. status bar C. ribbon D. toolbar
Which of the following is MOST likely used with RG-6 media?
A. MTRJ B. RJ-11 C. RJ-45 D. F-connector