1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
12

What is the basic difference between x.509 and pgp in terms of key hierarchy and key trust?

Computers and Technology
1 answer:
ra1l [238]3 years ago
3 0
In terms of key hierarchy, you have to request to a Certification Authority in order for them to issue you an X.509 certificate. On the other hand, you can creat your own pgp.

In terms of key trust, X.509 supports only a sole key owner. It can support only one digital signature to confirm the key's validity. This does not work for pgp.
You might be interested in
What are the two reasons we analyze algorithims
fredd [130]

The reason for analyzing an algorithm is to discover its characteristics in order to evaluate its suitability for various applications are compared with other algorithms for the same application

4 0
3 years ago
Why is it useful for students to practice the MLA and APA citation methods?
notka56 [123]

Answer:

Citing or documenting the sources used in your research serves three purposes:

It gives proper credit to the authors of the words or ideas that you incorporated into your paper.

It allows those who are reading your work to locate your sources, in order to learn more about the ideas that you include in your paper.

5 0
3 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
3 years ago
The two rules within Title II of hippa that have the greatest relevance and impact on the business associates are
Ne4ueva [31]
The two rules within Title II of HIPPA (Health Insurance Portability and Accountability Act) that has great relevance and impact on the business associates are: 

1. Privacy Rule - stating of child welfare agencies
2. Security Rule - complying of HIPPA requirements
5 0
3 years ago
Read 2 more answers
Which type of disease cannot be spread from one person to another
marusya05 [52]

<u>non-infectious, non-communable</u>. It means that they can't spread. I hope that helps! Also, and example of this non-infectious disease would be diabtetes, as in, if you're next to a person that has it, you won't get it lol.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What will be returned when the following SQL statement is executed?
    5·2 answers
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • Why is it important to verify a customer complaint?
    6·1 answer
  • Match the file extensions to the file types. Some file types may be used more than once.
    11·1 answer
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • Which question about whale sharks is nonscientific?
    11·2 answers
  • Write a function (subroutine) that inputs a data value in register r0 and returns value in r0. The function returns y 5 a 1 bx 1
    15·1 answer
  • You do not really know that you have a hand. Here is why. Imagine the possibility in which you are only a handless brain floatin
    14·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    15·1 answer
  • Anyone knows the answer for 6.1.4 Happy Birthday! codehs
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!