_______ certificates are used in most network security applications, including IP security, secure sockets layer, secure electronic transactions, and S/MIME.
A. X.509 B. PKI
C. FIM D. SCA
A. X.509
You might also like to view...
Match the meanings to the following terms:
I. Combinations of text and numbers II. Lengthy text or combinations of text and numbers III. Numeric data used in mathematical calculations IV. An object in a Microsoft Access table created outside of Access V. Monetary values involving data with one to four decimal places VI. Sequential number assigned by Microsoft Access A. Currency B. OLE Object C. AutoNumber D. Number E. Short Text F. Long Text
What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?
A. A web server with multiple virtual host configurations. B. An e-mail server that utilizes load balancing features. C. A clustered application that shares its IP address with other instances. D. A network monitoring application such as an intrusion detection system (IDS).