1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
10

A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service

s to support this strategy. Which of the following protocols supports the strategy and employs certificates generated by the PKI? (Choose three.)
A. S/MIME
B. TLS
C. SFTP
D. SAML
E. SIP
F. IPSec
G. Kerberos
Computers and Technology
1 answer:
Softa [21]3 years ago
4 0

Answer:

A. S/MIME

B. TLS

C. Kerberos

Explanation:

PKI : Public Key Infrastructure is a technique which will allow services or applications to communicate securely across the unsecured network or internet.

PKI mainly consist of CA or Certificate Authority who can issue digital certificates or they are also known as trusted CA.  exmaples are godaddy, digicert, verizone, symmantec, etc.. and RA also known as Registration Authorities and they verify if the requested certificates can be stored at CA. Keys will be stored in the central directory.It will also consists of certificate management system and the policies governing PKI.

S/MIME : Secure/Multipurpose Internet Mail Extensions which use assymentric cryptography and sign the MIME data.   S/MIME will provide services like  Authentication, Encryption , Integrity, Privacy and Non repudiation for messaging applications

SMIME uses certificates which can be self signed or CA certified. It specifies MIME type as  application/pkcs7-mime  while transmitting the data.

TLS : Transport Layer Security. the earlier versions used to be known as SSL ( Secure Socket Layer) SSLv3 got depreciated and TLSv1.2/1.3 are popularly used to provide encryption, authentication, Integrity and Hashing for client to server side communication.

Most of the applications communicate securely using TLS.  They will establish secure TCP connection using SSL Handshake. During the Handshake they will exchange supported versions, ciphersuites and certificates. Applications which uses TLS always uses CA certificates and Inhouse applications can communicate using self signed certificate or even with CA certificates.

HTTPS which is also known as HTTP over SSL is widely used for almost all the web services to communicate securely across the internet.

Kerberos : It is a protocol used to prove the identity for two nodes which are communicating with each other. Kerberos uses both symmetric key cryptography and assymetric key cryptography. However, symmetric key cryptography is used widely and public key cryptography is used optionally.

Authentication server which is also known as AS is used to authenticate the requesting client.  It further forwards the user credentials to key distribution center. KDC further issues to TGT ( ticket granting ticket) and it uses TGS's secret key to encrypt. User will receive a encrypted output.  

When a User Login then The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. Sessions will be renewed and managed by users session manager.

You might be interested in
When you adopt a certain framework or strategy for solving a series of problems, you may fail to see other, more efficient ways
Olegator [25]
I believe it is called closed mindset. Closed mindset is when you fail to see other ways to your error and don't accept help or think you can improve.
7 0
4 years ago
Drag the tiles to the correct boxes to complete the pairs.
-BARSIC- [3]

1) ECPA is D. Prohibits the government and law enforcement agencies from acquiring information about an individual through telephonic or digital media.

2) COPPA is C. Restricts websites from acquiring information from users below the age of thirteen.

3) OPPA is A. Directs company websites to declare their privacy policies and their expiration dates on their websites if the users are from California.

4) FCRA is B. Regulates credit ratings and how agencies view an individual's credit information.

8 0
3 years ago
Read 2 more answers
What is meant by usability and what characteristics of an interface are used to assess a system’s usability?
ahrayia [7]

Answer:

The answer is below

Explanation:

Usability is a term that describes the assessment of the performance of a system in assisting the task of the user, or how effective a certain product system or design supports the task of a user in accomplishing a set out objective as desired.

The characteristics of an interface that are used to assess a system’s usability are:

1. Effectiveness

2. Efficiency

3. Error Tolerance

4. Engagement

5. Ease of Learning and Navigation

3 0
3 years ago
What formula most likely exists in D18?
gavmur [86]
<span>Cystagia from Dynamic Nutritionals is a homeopathic UTI, bladder and kidney support that promotes urinary tract health and function.</span>
4 0
3 years ago
Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
ivann1987 [24]

Answer:

A two

B system unit

C Computer

Game

4 0
4 years ago
Other questions:
  • Create a class called Toddler that inherits from a class called Parent. (Note that Parent has already been defined elsewhere, so
    8·2 answers
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • What would be a standard way for anyone outside an agile team( for example, delivery partner partner of the account, head of the
    14·1 answer
  • Which scenario could be represented by the given graph?
    14·1 answer
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • Write code to check that HairEyeColor is an array. e) Write code to determine: (i) the total number of respondents in the survey
    6·1 answer
  • To cope with the uncertainty about how their pages will be viewed, many web page designers opt to use _________ units, which are
    13·1 answer
  • Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders.
    11·1 answer
  • What is the relationship between an object and a class? A. An object is an instance of a class. B. A class is an instance of an
    5·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!