1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
5

A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate

the other’s certificate c. A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection d. A scenario in which the certificate’s issuer and subject fields hold the same information
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
7 0

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

RUDIKE [14]3 years ago
3 0

Answer:

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

Explanation:

A trust domain is a certificate that entities or users gain and is granted by a trusted domain this is that when you enter another software or other systems you will be recognized as a trusted character or user and gives protection between systems and softwares and provides protection for the users.

You might be interested in
Due to the absorption and scattering of shorter wavelengths by interstellar dust, distant stars appear A) bluer. B) brighter. C)
pickupchik [31]

Answer:

(C) Redder.

Explanation:

Distant stars appear red because of the phenomenon known as “red-shift” which happens more when the star is very far from the observer .This happens because of the scattering of shorter wavelengths also by space dust. So it could be either natural redness OR distance.So we conclude that the answer is Redder.

7 0
3 years ago
Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
slavikrds [6]

Answer:Sum functions() and Count functions() of logical test arguments used in formula .

Explanation:The Count () function returns the number of that rows match that a specified column.

Count (column_ Name)

table name

The count SQL Function finds the number condition.

SELECT COUNT(Condition Id)

FROM Condition;

The Sum () Function returns to the total sum number of columns.

SUM (Column_Name)

table name

The Sum SQL Function find the sum of the table.

3 0
3 years ago
Read 2 more answers
Why is peer answer always not working? just wondering idk why
Nady [450]
Wait.....What do you mean?
5 0
3 years ago
Read 2 more answers
You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
-BARSIC- [3]

Answer:

The answer is "Developing the custom control for the user interface"

Explanation:

The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.

Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.

6 0
3 years ago
Rounding up and down for 389,422
elena-14-01-66 [18.8K]

Answer:

389420

389430

Explanation:

the up is for 389430

the down is for 389420

4 0
3 years ago
Other questions:
  • Which is a function of network media?
    11·2 answers
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report visually, typically
    15·1 answer
  • What is the difference between a design pattern and a DLL?
    12·1 answer
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    12·1 answer
  • / Looks up author of selected books
    15·1 answer
  • Name all mario kart games in order
    15·2 answers
  • Can someone please help me to point out what's wrong with this C program:
    13·1 answer
  • The software that displays the resulting web pages is​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!