1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
5

A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate

the other’s certificate c. A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection d. A scenario in which the certificate’s issuer and subject fields hold the same information
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
7 0

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

RUDIKE [14]3 years ago
3 0

Answer:

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

Explanation:

A trust domain is a certificate that entities or users gain and is granted by a trusted domain this is that when you enter another software or other systems you will be recognized as a trusted character or user and gives protection between systems and softwares and provides protection for the users.

You might be interested in
A function ________ contains the statements that make up the function.
mestny [16]

Answer:

A) definition

Explanation:

3 0
3 years ago
If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
Deffense [45]
A writer maybe, because you can work by yourself, even at home.
6 0
3 years ago
Read 2 more answers
Assslainsdffddsvvdesdssbhasasco5m
alexandr402 [8]
Hahahahaha I wanna was the day I wanna was the last time I got to
8 0
3 years ago
Read 2 more answers
Which query will give the following result when it it applied on table 1????!!!!!
Mandarinka [93]

Answer:

B

Explanation:

You need Name , Age and Gender

the second requirement should only match the last row where age is 20 and gender is male.

thrid requirement of the query is that its syntax should be correct.

Option B staisfies all of required so it is the correct option.

6 0
3 years ago
According to the video, what is the goal of Film and Video Editors?
Eddi Din [679]

Answer:

To maintain their Skills

Explanation:

The main job of video editor and film editor is to gather the raw material related to some particular topic that is provided by camera person. With the help of skills the video editor convert that raw video into finished product that will be able to broadcast.

That is the reason, he should maintain his skills to preform the video editing task accurately.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
    8·1 answer
  • What is the leading use of computers
    15·2 answers
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions,
    10·1 answer
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    15·1 answer
  • Which job qualifications are typical for someone who wants to work in Information Support and Services?
    8·2 answers
  • In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
    7·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • 2 differences between system and applications software​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!