a. What is the strongest form of authentication? b. List the functions of a PKI. c. Can a firm be its own certificate authority? d. What is the advantage of doing so? e. Who creates a computer’s private key–public key pair? f. How do CAs distribute public keys? g. What is provisioning? h. What is the prime authentication problem? i. What can be done to reduce this risk?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here