1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
2 years ago
12

In a certificate authority (ca) infrastructure, why is a client certificate used?

Computers and Technology
2 answers:
devlian [24]2 years ago
4 0

The client certificate that is used as part of the authorizations before launching a secure connection.

<h3>What is a client certificate?</h3>

A client certificate is a form of digital certificate that is used to make authenticated request to a remote server.

In this case, the client certificate is used as part of the authorizations before launching a secure connection.

Learn more about certificate on:

brainly.com/question/24931496

#SPJ12

Evgesh-ka [11]2 years ago
3 0

Answer:

To authenticate the client with other computers, a client certificate is utilized. For component of the permissions before starting an encrypted channel, the client utilizes the CA certificate to validate the CA signature on the server certificate. Client software is often used. Web pages, for example, offer a list of trustworthy CA certificates, since  many users rely on their client software.

You might be interested in
Where to get industrial circuits far cry 6
Bond [772]

Answer:

Lola's Shop. They are available in the El Este, Madrugada, and Valle de Oro areas.

8 0
3 years ago
Suppose that the code below is the body of some loop. Given variables x and y write some code that reads a value into the variab
ra1l [238]

Answer:

I will code in JAVA.

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

     float x;

     float y;

     float result;

     Scanner input = new Scanner(System.in);

     while(true){ <em>//this is an infinite loop</em>

       x = input.nextFloat(); <em>//wait the input for x</em>

       y = input.nextFloat(); <em>//wait the input for y</em>

       if(y == 0) {

         continue; <em>//next iteration without print.</em>

       } else{

         result = x/y;

         System.out.print(result); <em>//print the result.</em>

       }

     }

 }

}

Explanation:

To get the numbers, you need to import Scanner class, and use the method nextFloat() to admit floats and integers.

If y is 0 then, executes the continue statement, if not prints the division between x and y.

4 0
4 years ago
In the context of object-oriented programming a(n) is a template for a group of objects with similar characteristics.
MArishka [77]

A class is a template for a group of objects with similar characteristics.

An object-oriented programming uses objects, instead of <em>functions and logic </em>to model software designs.

In an object-oriented programming, there are:

  • Objects
  • Classes
  • Methods
  • Etc

Objects are what make up the object-oriented programming.

Similar objects are grouped together into classes

Hence, the text that completes the blank is class

Read more about object-oriented programming at:

brainly.com/question/22530356

7 0
3 years ago
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
VladimirAG [237]
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which shows three dimensional data is known as Bubble chart. It also can be seen as the variation of scatter plot where bubbles replace the data points.
4 0
3 years ago
Other questions:
  • Los antivirus no son infalibles y en ocasiones pueden darnos :
    10·1 answer
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • Operating systems such as Microsoft Windows use a specific character before a file extension to separate it from the filename. W
    9·2 answers
  • In cell e9, enter a formula that calculates the session fee for a member. members receive a member discount off the non-member s
    9·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Proofreaders' marks are:
    6·1 answer
  • Create a statement that always returns the names of the three criminals with the highest number of crimes committed.
    15·1 answer
  • The Ingenuity and the MOXIE are two new pieces of technology on the Perseverance. What role will these instruments play? How wil
    6·2 answers
  • Everyone say bye to brainly cause I’m reporting it for being against the law
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!