_______ certificates are used in most network security applications, including IP security, secure sockets layer, secure electronic transactions, and S/MIME.

A. X.509 B. PKI

C. FIM D. SCA

A. X.509

Computer Science & Information Technology

You might also like to view...

Match the meanings to the following terms:

I. Combinations of text and numbers II. Lengthy text or combinations of text and numbers III. Numeric data used in mathematical calculations IV. An object in a Microsoft Access table created outside of Access V. Monetary values involving data with one to four decimal places VI. Sequential number assigned by Microsoft Access A. Currency B. OLE Object C. AutoNumber D. Number E. Short Text F. Long Text

Computer Science & Information Technology

What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?

A. A web server with multiple virtual host configurations. B. An e-mail server that utilizes load balancing features. C. A clustered application that shares its IP address with other instances. D. A network monitoring application such as an intrusion detection system (IDS).

Computer Science & Information Technology