1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
n200080 [17]
3 years ago
11

What is the purpose of exporting your public key to the directory services server?

Computers and Technology
1 answer:
Natalka [10]3 years ago
5 0

Answer:

The main reason for exporting your public key to the directory services server is simply to enable others to encrypt messages that they want to send to you. If you do not export your public key to the directory services server, people can still send messages to you, but they will be unencrypted messages.

The encrypted messages sent to you can be decrypted using your private key.

Explanation:

You might be interested in
I got a question in computer science I don't understand, can someone please help.​
AnnyKZ [126]

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

6 0
2 years ago
If there is no computer how would human beings have performed the workk
Katena32 [7]

I’m pretty sure we would do things at the agency would do it because overall th i’m pretty sure we would do things at the agency would do it because overall the agents were actually much smarter than we are literally right now and someways because they use more organic and natural and a whole things like herbs Escentuals would help you more than the chemicals in the flu shots that we take and have chemicals and are bad for the body

3 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
Zepler [3.9K]

Answer:

the answer is to fail

Explanation:

4 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are
Sphinxa [80]

Answer:

Option (B) is the right answer.

Explanation:

The following term can be described as :  

(A) Automation: Automation can be defined as a concept of controlling systems automatically or electronically by using various control systems.  

B) Rationalization of procedures: The term rationalization can be defined as the concept of reorganizing things with automation or any other means to make it more efficient.

C) Paradigm shift: The term paradigm shift can be defined as the concept of changing the thinking and perception to do things in the real world.

D) TQM: TQM stands for the term of total quality management, whose main purpose is to check and improve the quality time to time by various means.

E) Six sigma: The term six sigma can be defined as the concept of continuous improvement by removing the defects in any process.

Hence according to the scenario, the most appropriate answer is option (B).

8 0
3 years ago
Other questions:
  • Were Al Zink’s actions that of someone trying to be an invisible Sponsor
    14·1 answer
  • Write a program that prompts the user to enter a string (may contain spaces) and displays its last character. Enter s string: Pr
    13·1 answer
  • How would you "break" a firewall in a laptop computer if you were no longer a administrator? (Cyber Security Related, Computers
    5·1 answer
  • Which Additional Authorization List item can replace the hook at the end of the winch cable for fastening the cable to some load
    12·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • The MAC address is a _____ bit number.
    10·2 answers
  • What is the phase of a waveform ?
    15·1 answer
  • What profession do you prefer to have in the future? In what way could you make an impact on society using the Internet?
    7·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • Show me how to create an argument essayshow me how to create an argument essay ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!