COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Certificate issuing
|
|
providing access control
|
|
key storage and updation
|
|
to generate primary and public key
|
Detailed explanation-1: -PKIs support identity management services within and across networks and underpin online authentication inherent in secure socket layer (SSL) and transport layer security (TLS) for protecting internet traffic, as well as document and transaction signing, application code signing, and time-stamping.
Detailed explanation-2: -Custom is not one of the main PKI trust models.
Detailed explanation-3: -Explanation: The components of Public Key Infrastructure are CA, RSA, RA, and digital certificates. Therefore, XA is not a component of public key infrastructure (PKI).
Detailed explanation-4: -Certificate Authority (CA) In a PKI system, the client generates a public-private key pair. The public key and information to be imprinted on the certificate are sent to the CA. The CA then creates a digital certificate consisting of the user’s public key and certificate attributes.