1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
10

A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service

s to support this strategy. Which of the following protocols supports the strategy and employs certificates generated by the PKI? (Choose three.)
A. S/MIME
B. TLS
C. SFTP
D. SAML
E. SIP
F. IPSec
G. Kerberos
Computers and Technology
1 answer:
Softa [21]3 years ago
4 0

Answer:

A. S/MIME

B. TLS

C. Kerberos

Explanation:

PKI : Public Key Infrastructure is a technique which will allow services or applications to communicate securely across the unsecured network or internet.

PKI mainly consist of CA or Certificate Authority who can issue digital certificates or they are also known as trusted CA.  exmaples are godaddy, digicert, verizone, symmantec, etc.. and RA also known as Registration Authorities and they verify if the requested certificates can be stored at CA. Keys will be stored in the central directory.It will also consists of certificate management system and the policies governing PKI.

S/MIME : Secure/Multipurpose Internet Mail Extensions which use assymentric cryptography and sign the MIME data.   S/MIME will provide services like  Authentication, Encryption , Integrity, Privacy and Non repudiation for messaging applications

SMIME uses certificates which can be self signed or CA certified. It specifies MIME type as  application/pkcs7-mime  while transmitting the data.

TLS : Transport Layer Security. the earlier versions used to be known as SSL ( Secure Socket Layer) SSLv3 got depreciated and TLSv1.2/1.3 are popularly used to provide encryption, authentication, Integrity and Hashing for client to server side communication.

Most of the applications communicate securely using TLS.  They will establish secure TCP connection using SSL Handshake. During the Handshake they will exchange supported versions, ciphersuites and certificates. Applications which uses TLS always uses CA certificates and Inhouse applications can communicate using self signed certificate or even with CA certificates.

HTTPS which is also known as HTTP over SSL is widely used for almost all the web services to communicate securely across the internet.

Kerberos : It is a protocol used to prove the identity for two nodes which are communicating with each other. Kerberos uses both symmetric key cryptography and assymetric key cryptography. However, symmetric key cryptography is used widely and public key cryptography is used optionally.

Authentication server which is also known as AS is used to authenticate the requesting client.  It further forwards the user credentials to key distribution center. KDC further issues to TGT ( ticket granting ticket) and it uses TGS's secret key to encrypt. User will receive a encrypted output.  

When a User Login then The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. Sessions will be renewed and managed by users session manager.

You might be interested in
You can use colors, patterns, and borders to enhance the overall appearance of a worksheet and to make it easier to read. One of
AveGali [126]

Answer:

Page Layout is the correct answer of this question.

Explanation:

The Page Layout Tab includes most of the tools you need to organize your file pages only the direction we need them to. You can set borders, themes, monitor site alignment and scale, add sections and carriage returns, monitor line numbers, and adjust the protrusion and outlines for paragraphs.

On way to incorporate these enhancements is by using the Ribbon Borders, Font Shades, and Fill Color buttons in the Font section on the Page Layout tab.

8 0
3 years ago
What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.
yulyashka [42]

Answer:

The command to create a compressed archive (archive1.tar.gz) is

tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

Explanation:

The explanation for the above command is

The general command to create a compressed archive is

tar -czvf name-of-archive.tar.gz /path/to/directory-or-files

Here, the terms are as follows:

-c : Creates an archive

-z : Compress the archive with gzip.

-v : This is known as verbose. This is an optional command and it displays the progress on terminal command. Without this the progress is not displayed on terminal command.

-f : Allows to specify the file name of the archive.

Here, if we want to archive multiple files, we provide the command the names of multiple files or directories of the files also can be used.

So, the command tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

creates a compressed archive  - archive1.tar.gz of files test1, test2 and test3.

 

7 0
3 years ago
What is the advantage of maintaining a list of keywords while creating a design blueprint?
elixir [45]

Creating a list of keywords and using them throughout your site helps move pages up the ranks of search engines like Bing or Google. They also attract website visitors. Technically, maintaining a list of keywords while creating a webpage is important in search engine optimization.






8 0
3 years ago
Read 2 more answers
Why do companies use online collaborative productivity software.
vladimir2022 [97]

Why do companies use online collaborative productivity software? Companies use online collaborative productivity software to allow employees to share document such as reports or spreadsheets and make edits or comments.

4 0
3 years ago
Hello my friends i am trying to reboot my i phone 4 but i could not i tried many ways can u help me
g100num [7]

Answer:

Launch iCloud.com in the web browser on your PC.

After the page opens, enter the credentials; username and password.

On the screen, after you login, you’ll see all iDevices you’ve associated...

Choose "Erase operation" for devices you can’t log inside.

or

Connect your iPhone to a computer. If your iPhone gets hung up on the Apple logo or a solid-color screen when forcing it to restart, you can try using your PC or Mac to repair it without losing data. Start by connecting the iPhone to the computer using its charging cable.

2

Open Finder (Mac) or iTunes (PC). If you're using Mac Catalina or later, click the two-toned face on the Dock to launch Finder. If you have Windows or an earlier version of macOS, open iTunes from the Start menu or Applications folder. Locate your iPhone. If you're using Finder, click your iPhone's name in the left panel under "Locations." If you're using iTunes, click the button with an iPhone icon near the top-left corner of the app (to the right of the drop-down menu)

Explanation:

8 0
3 years ago
Other questions:
  • Hub is used in Twisted pair Ethernet. True/False
    6·1 answer
  • Which of the following are types of formatting you
    12·2 answers
  • Binary is best interpreted by a computer because?
    8·2 answers
  • If there is a slow internet connection or limited access to certain sites it is often better to _________ a video file before st
    9·2 answers
  • Karen took an assessment with 291 questions, and it described her preferred style of working, learning, leading, risk-taking and
    13·1 answer
  • Question 16 of 20
    12·2 answers
  • AddAll - Adds all the doubles in the string with each other. Note every double is separated by a semi-colon. AddAll("1.245;2.9")
    6·1 answer
  • A website's ____ page provides basic information about the individual or organization and includes a navigation bar with links t
    13·1 answer
  • If you want to insert a table which ribbon should you select
    13·2 answers
  • A major public university graduates approximately 10,000 students per year, and its development office has decided to build a We
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!