Should a PKI be supported on a firewall (meaning that the certificates would be stored on the firewall and the firewall would distribute certificates on demand)? Explain your answer.

What will be an ideal response?


This depends on a number of factors, but primarilyperformance requirements and the security requirements of the certificates. For normal use cases, certificates should be created only when the creator knows the identity of the recipient with high assurance, and a fully automated distribution mechanism is therefore inappropriate.

Computer Science & Information Technology

You might also like to view...

A shadow password file is a(n) ________.

a) imitation password file used by the system to trick malicious users b) false password file that is placed on a system by a malicious user c) password file that is accessible only by users with root privileges d) deleted password file that is still stored in memory

Computer Science & Information Technology

You should prepare a list of questions that you want answered at the interview

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is the best option when you are told to avoid widows?

A) Change the page layout to landscape. B) Select the Keep Lines Together choice. C) Insert a page break after every paragraph. D) Make every sentence fit on one line of the document.

Computer Science & Information Technology

When coding a selection instruction in Visual Basic, the code that follows the Else statement includes those instructions that will be executed when the condition is true.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology