A certificate contains an identity, a public key, and signatures attesting that the public key belongs to the identity. Other fields that may be present include the organization (for example, university, company, or government) to which that identity belongs and perhaps suborganizations (college, department, program, branch, office). What security purpose do these other fields serve, if any? Explain your answer.
What will be an ideal response?
Sometimes these other fields are the keys to establishing trust.For instance, my use case may cause me to trust anyone with a valid US government email address, and having that email address be part of a certificate may be sufficient proof as long as I trust the certificate authority that issued the certificate to have validated that information.
You might also like to view...
What happens when you define a class that used dynamic memory allocation and define a destructor but no copy constructor?
a. If an object of the class is plugged in for a call-by-value parameter, when the function ends, the parameter's dynamic memory is returned to the freestore at the end of the function execution. b. When an object that was used as an argument for a call-by-value parameter goes out of scope, it will cause a run-time error. c. It is possible to modify the values in the argument in the function. d. All of the above e. None of the above
Which technique involves each participant speaking or passing when it is his or her turn?
A. stratified sampling B. unstructured brainstorming C. structured brainstorming D. systematic sampling
Networking is the strongest source for job leads
Indicate whether the statement is true or false
The ________ command is used to change a chart so the horizontal and vertical data labels are switched
Fill in the blank(s) with the appropriate word(s).