Your organization has recently signed a contract with another organization. As part of this contract, you must establish a public key infrastructure (PKI) for added security during inter-organizational communication. Which mechanism in the PKI is issued to users and includes a public key?

A. certification authority (CA)
B. registration authority (RA)
C. steganography
D. digital certificate


D

Explanation: A digital certificate is the mechanism in the PKI that is issued to users and includes a public key.

Computer Science & Information Technology

You might also like to view...

Suppose TestSimpleCircle and SimpleCircle in Listing 9.1 are in two separate files named TestSimpleCircle.java and SimpleCircle.java, respectively. What is the outcome of compiling TestsimpleCircle.java and then SimpleCircle.java?

a. Only TestSimpleCircle.java compiles. b. Only SimpleCircle.java compiles. c. Both compile fine. d. Neither compiles successfully.

Computer Science & Information Technology

Which of the following is NOT listed in the text as being part of the checklist for evaluating the record set of a query?

A) Observe the number of rows and columns. B) Look at data in the record set to see that it matches with criteria. C) Evaluate if joins are removing required data from the set. D) Check results of any calculated fields.

Computer Science & Information Technology

You are hired by a small business to recommend which security policies and procedures would be most helpful to the business. The business is comprised of 15 employees, operating off of two shared servers. One server houses employee data, and the other houses client data. All machines are on the same local network. Often these employees must work remotely from client sites, but do not remotely

access either of the servers. Assuming no security policies or procedures are in place right now, which two policies are most applicable for implementation? A. password policies and data classification policies B. wireless access policies and virtual private network policies C. wireless access policies and password policies D. virtual private network policies and data classification policies

Computer Science & Information Technology

An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following device types is being installed?

A. Bandwidth shaper B. Intrusion detection C. Proxy server D. Load balancer

Computer Science & Information Technology