1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
2 years ago
6

Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to

verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
Computers and Technology
1 answer:
seropon [69]2 years ago
8 0

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

You might be interested in
Which of the following is used to track and gather information without knowledge or authorization?
harkovskaia [24]
It might be spyware... but i might be wrong.
3 0
3 years ago
Read 2 more answers
A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a
kap26 [50]

Answer:

A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a unique username and password before being able to associate with the wireless access points. Which of the following wireless features would be the MOST appropriate to achieve this objective?

Option A is the correct answer -  WPA2 PSK.

Explanation:

Data is the most essential asset for obtaining knowledge and information. Therefore, it has to be protected from various threats. However, the wireless network provides the option of sharing data without wires, but it is flying in the air. Thus, to secure it, we need to secure it with the right tools.

Option A: WI-FI Protected Access Pre-shared-Key (WPA2 PSK) is the best protection tool because it has 2 modes-PSK and Enterprise mode.

7 0
3 years ago
Read 2 more answers
Which of the following statements are true regarding Steve Jobs and Steve Wozniak? Select 3 options.
Furkat [3]

Answer:

1. Both Steve Jobs and Steve Wozniak raised $1000 by selling personal items, so that they could start Apple.

2. Steve Wozniak worked for Hewlett Packard designing calculators before starting Apple.

4. Steve Jobs never learned to code and primarily focused on design.

Explanation:

I just took the test.

8 0
3 years ago
Read 2 more answers
Information systems (is) users have no responsibility to follow security and backup procedures. group of answer choices true fal
Sauron [17]

The statement 'information systems (IS) users have no responsibility to follow security and backup procedures' is false.

Any kind of data that is available on the Internet has to be protected. All information users have the responsibility to follow the security procedures so that an unwanted circumstance does not arise. Hence, the statement above is false.

It is the responsibility of an organization to protect its data. For this reason, everyone, including the information systems (IS) users is entitled to follow security and backup procedures.

One should recognize that all these security and backup procedures are for our own security as data misplaced can be a loss to the whole organization. Security and backup procedures also help to keep data safe from hackers.

To learn more about information systems, click here:

brainly.com/question/25226643

#SPJ4

3 0
1 year ago
You have been banned from omegle due to possible terms of service violations by you, or someone else using your computer or netw
Schach [20]

1. Using VPN : Using VPN changes the IP address of your computer, changing the server for VPN again and again will change the IP and thus the omegle may suspect you as a robot or someone trying to load their server traffic and thus their algorithm banns it.

2. Leaving the account logged in : Sometimes when we shut a laptop from a friends house or another computer in house we leave the account logged in and thus if the account is logged in more then 5-6 times the server may think that the account is being used by someone else and thus banns it.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog? A. web page B. website C. web address D. email
    7·2 answers
  • Which type of system would be more reliable for keeping a plane traveling at constant speed – an automatically controlled feedba
    11·1 answer
  • How much does 1 American tank cost on gas for a regular mission? Depending on your answer, I will give you the right amount of p
    12·1 answer
  • In the Word 2016 window, where is the Status bar located?
    8·1 answer
  • Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
    5·1 answer
  • Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    14·1 answer
  • How do you use VMware Fusion to make a Tip Calculator?
    10·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • How to create a comparator generic type in java.
    10·1 answer
  • I really need the answer now!!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!