1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
3 years ago
15

Your boss wants you to set up an authentication scheme in which employees will use smart cards to log in to the company network.

What kind of key should be used to accomplish this?A. (private key)
B. Public key
C. Cipher key
D. Shared key
Computers and Technology
1 answer:
melisa1 [442]3 years ago
6 0

Answer:

private key

Explanation:

For an enterprise that uses smart cards for strong user authentication, a digital certificate needs to be issued to the smart card. This digital certificate is used to identify the user and the infrastructure that does that is known as PKI (Public Key Infrastructure). PKI involves the use of a public key that is accessible to everyone and a private key that is stored on the card. Encrypted information on one key can only be decrypted by the other key, and vice versa This is to suggest that it is a transitive process. Therefore, since PKIs depend heavily on private keys, I should use private keys and keep these keys safe and secure since only the intended user have access to them.

You might be interested in
How do I change my keyboard's debounce time?
Zanzabum

in the control board type:

HKEY_CURRENT_USER\Control Panel\Accessibility\Keyboard Response\BounceTime

3 0
3 years ago
Read 2 more answers
What do you mean by hardware and software?<br>​
rusak2 [61]

Answer:

I think the above information will help you a lot.

Have a nice day.

7 0
3 years ago
Read 2 more answers
Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his compute
ozzi

Answer: Utility Software

Explanation:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

3 0
3 years ago
COMPUTER SCIENCE HELP!!!!!
maw [93]
1.( I need to know what program this is for to answer this one)
2.Explain a game you played for this one and include a interactive element it had like a Side-quest/Npc/Cool Background ect.
3.For 3D games you have to worry about smoothing and lighting, as for 2D you have to worry about keeping the objects within the players POV as they are usually locked to character and stuck facing one direction.
4.???(need progam name)
5.If the game is based in a snow biome you would use snow landscape textures.
8 0
4 years ago
1. Which of the following is a search engine?
Effectus [21]
<span>C)Google
D) Search engines often provide different results, even when you enter the same query.
</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    13·2 answers
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • Which option will automatically update copied data?
    12·2 answers
  • Complete the PizzaCaloriesPerSlice() function to compute the calories for a single slice of pizza. A PizzaCalories() function re
    6·1 answer
  • What is the term for a set of actions carried out on inputs?
    7·1 answer
  • The space between the margin<br> and start<br> of paragraph is called
    8·1 answer
  • *
    6·2 answers
  • It is where your cpu (processor) is installed
    10·2 answers
  • dion training just installed a new webserver within a screened subnet. you have been asked to open up the port for secure web br
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!