1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
5

A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate

the other’s certificate c. A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection d. A scenario in which the certificate’s issuer and subject fields hold the same information
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
7 0

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

RUDIKE [14]3 years ago
3 0

Answer:

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

Explanation:

A trust domain is a certificate that entities or users gain and is granted by a trusted domain this is that when you enter another software or other systems you will be recognized as a trusted character or user and gives protection between systems and softwares and provides protection for the users.

You might be interested in
For an alternative to the String class, and so that you can change a String's contents, you can use_________ .
mr_godi [17]

Answer:

c. StringBuilder

Explanation:

An alternative to the String class would be the StringBuilder Class. This class uses Strings as objects and allows you to mix and match different strings as well as adding, removing, implementing,  and modifying strings themselves as though they were similar to an array. Unlike the string class StringBuilder allows you to modify and work with a combination of strings in the same piece of data as opposed to having various objects and copying pieces which would take up more memory.

7 0
4 years ago
What is the full word of"VPN"?​
pantera1 [17]

Answer:

Virtual Private Network.

Explanation:

A VPN helps protect your data when accessing the internet. It usually scrambles your IP location and encrypts your data.

5 0
3 years ago
Read 2 more answers
How do i delete a question ?
seraphim [82]

i think we can't do that

7 0
3 years ago
How Extreme Programming addresses Software Testing andevolution ?
kumpel [21]

Answer:

Extreme programming is a software development technique which is used to enhance software quality and it's response to ever changing customer requirements.

Testing

Testing is main focus in extreme programming.Extreme programming addresses testing in a way that if a minute testing can eliminate a bit of flaws, extensive testing can terminate a lot of flaws.

Evolution in Extreme programming is like this:-

Coding:-First programmers will code the problem.

Testing :- Testing is done to remove flaws.

Listening:- Programmers must listen to the customers to what they need.

Designing:-Then design according to the customer needs.

6 0
3 years ago
How old is the oldest asian
fomenos

Answer:

100000000000000000000000000

7 0
4 years ago
Read 2 more answers
Other questions:
  • A form that dedicates a page for each item retrieved for a case; it allows investigators to add more detail about exactly what w
    10·1 answer
  • _____, which are generated by web server software, record a user's actions on a web site. viruses log files junk e-mails worms
    7·1 answer
  • Who has access to the source code of proprietary software?
    15·2 answers
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    15·2 answers
  • Which of the following is considered part of the process in the systems thinking example of a TPS?
    6·1 answer
  • Students at a university are working on a project. the project involves many computing systems working together on disjointed ta
    9·2 answers
  • What is the difference between master file and transaction file​
    10·1 answer
  • You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
    8·2 answers
  • In what order does the Cascade look at factors to determine which CSS rule to follow?
    14·1 answer
  • Do you humans know what math is?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!