1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
6

Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to

verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
Computers and Technology
1 answer:
seropon [69]3 years ago
8 0

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

You might be interested in
Consider the use of 1000-bit frames on a 1-Mbps satellite channel with a 270-ms delay. What is the maximum link utilization for,
natka813 [3]
I feel as if it would be B.
5 0
3 years ago
Write a script named dif.py. This script should prompt the user for the names of two text files and compare the contents of the
mestny [16]

Answer:

Following are the code to this question:

f1=input('Input first file name: ')#defining f1 variable that input file 1

f2=input('Input second file name: ')#defining f2 variable that input file 2

file1=open(f1,'r')#defining file1 variable that opens first files by using open method  

file2=open(f2,'r')#defining file1 variable that opens second files by using open method  

d1=file1.readlines()#defining d1 variable that use readlines method to read first file data

d2=file2.readlines()#defining d2 variable that use readlines method to read second file data

if d1==d2:#defining if block that check file data

   print('Yes')#when value is matched it will print message yes  

   exit# use exit keyword for exit from if block

for j in range(0,min(len(d1),len(d2))):#defining for loop that stores the length of the file  

   if (d1[j]!=d2[j]):#defining if block that check value is not matched

       print('No')#print the message "NO"

       print("mismatch values: ",d1[j]," ",d2[j])#print file values

Output:

please find the attached file.

Explanation:

code description:

  • In the above code, the "f1 and f2" variable is used for input value from the user end, in which it stores the file names. In the next step, the "file1 and file2" variable is declared that uses the open method to open the file.
  • In the next line, the"d1 and d2" variable is declared for reads file by using the "readlines" method.
  • Then, if block is used that uses the "d1 and d2" variable to match the file value if it matches it will print "yes", otherwise a for loop is declared, that prints files mismatch values.

8 0
3 years ago
What does an Information security analysts do?
coldgirl [10]

Answer:

Information security analysts install software, such as firewalls, to protect computer networks. Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Explanation:

hope this helps

4 0
3 years ago
Para que sirve microsoft exel
Kryger [21]
Is this a question..
3 0
3 years ago
How do you take a picture on an apple computers
Mamont248 [21]

Answer:

You go to the launcher, then find Photo Booth. Photo Booth allows you to take photos. You can only take photos on the side where the screen is, since there isn't a camera on the back. I recommend taking a picture with a phone instead. For a screenshot, press command-shift-3.

Hope this helps!

3 0
3 years ago
Other questions:
  • When an IPv6 device with no pre-configured IPv6 address powers up, it can calculate a global 128-bit IPv6 address for itself usi
    12·1 answer
  • How to write a self-analysis essay
    5·1 answer
  • Plz help me i need it asap
    5·1 answer
  • Which best describes IMEI?
    5·1 answer
  • Is an applications program is a program designed to perform a specific task for specific users
    5·1 answer
  • Define the terms of data and information .​
    6·1 answer
  • Custom actions help your users by
    6·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    13·2 answers
  • define the term computer hardware and its various types mentioning 5 examples of IP or devices with one diagram each​
    9·1 answer
  • What is the fullform of BIT​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!