1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
2 years ago
12

A____consists of many users and their information.​

Computers and Technology
2 answers:
Oduvanchick [21]2 years ago
8 0

Answer:

Active Directory

Explanation:

grin007 [14]2 years ago
7 0

<u>Active Directory</u> consist of many users and their information.

You might be interested in
Convert 42DB5000 base 16 to base 10 floating point form assuming this is a signed floating point encoding (IEEE754) (32-Bit)
ozzi

Sign = bit 32 = 0

Exponent = bits 24..31 =  10000101 = 133. Exponent is 133-127 = 6

Mantissa = bits 1..23 = 10110110101000000000000 = 5984256

is 1/2 + 1/8 + 1/6 + ...

resulting float value: 109.65625

3 0
3 years ago
What is the difference between a key escrow and a recovery agent? (Choose all that apply.)
Black_prince [1.1K]

Answer:

A and E

Explanation:

A Key Escrow is necessary when a third-party needs access to encrypted data, such as when there is a court order to decrypt the encrypted data. It involve the law giving the order to decrypt the encrypted data.

A Recovery Agent is a person/entity/role allowed to decrypt a user's data in case of emergency, such as when the original key is lost by the user. It is primarily for helping internal users

8 0
3 years ago
A network on the internet has a subnet mask of 255.255.240.0. what is the maximum number of hosts it can handle
Lera25 [3.4K]
It is a class B network, so for a class B network, the upper 16 bits form the network address and the lower 16 bits are subnet and host fields. Of the lower 16 bits, most significant 4 bits are 1111. This leaves 12 bits for the host number. So, 4096(2^12) host address exists. First and last address are special so the maximum number of address is 4096-2=4094.
7 0
3 years ago
I don't know what to do, anyone there?​
s2008m [1.1K]
I’m here, hello. . . . . . .
3 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
Other questions:
  • Which method of encryption is based on physics principles?
    5·1 answer
  • public class BaseballTeam { private String city, mascot; private int numberOfPlayers; @Override public boolean equals(Object obj
    10·1 answer
  • What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
    11·1 answer
  • Which type of spreadsheet cell represents the left hand sides (lhs) formulas in an optimization analysis?
    5·1 answer
  • Use the Bisection Method to find the root 2. Write a main program and a function program 3. Main Program a. define constants b.
    9·1 answer
  • Develop a program that implements the POLYNOMIAL ADT using the LIST ADT. The POLYNOMIAL ADT is used to represent polynomials and
    8·1 answer
  • Is it true or false 1-5
    13·1 answer
  • What command can you use if you accidentally delete a sentence in your document?
    13·2 answers
  • Programs for embedded devices are often written in assembly language. Some embedded processors have limited instructions, like M
    5·1 answer
  • PLEASE HELP ASAPP!!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!