(a) What is the strongest form of authentication? (b) List the functions of a PKI. (c) Can...
Question:
(b) List the functions of a PKI.
(c) Can a firm be its own certificate authority?
(d) What is the advantage of doing so?
(e) Who creates a computer's private key/public key pair?
(f) How do CAs distribute public keys?
(g) What is provisioning?
(h) What is the prime authentication problem?
(i) What can be done to reduce this risk?
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: