首页 > 市场营销
题目内容 (请给出正确答案)
[多选题]

SET是Secure Electronic Transaction,即安全电子交易的英文缩写。它是一个在互联网上实现安全电子交易的协议标准,它是()

A.会话层的网络标准协议

B.规定了交易各方进行交易结算时的具体流程和安全控制策略

C.SET通过使用公共密钥和对称密钥方式加密保证了数据的保密性

D.SET通过使用数字签名来确定数据是否被篡改、保证数据的一致性和完整性,并可以完成交易防抵赖

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“SET是Secure Electronic Transact…”相关的问题
第1题
If you want to buy some old furniture, you should______.A.get in touch with NOVA ELECTRONI

If you want to buy some old furniture, you should______.

A.get in touch with NOVA ELECTRONICS

B.call at 2524-5867 any day except Monday

C.do it before you move to another place

D.call at either 2524-5867 on Monday or 2521-6011 on Saturday

点击查看答案
第2题
He’ll always be ____ to you for what you’ve done.

A、peaceful

B、secure

C、grateful

D、companion

点击查看答案
第3题
If law and order ______ not preserved, people will not be able to live a secure life. ()A

If law and order ______ not preserved, people will not be able to live a secure life. ()

A.are

B.were

C.is

D.was

点击查看答案
第4题
If law and order ______ not preserved, people will not he able to live a secure life.A.are

If law and order ______ not preserved, people will not he able to live a secure life.

A.are

B.were

C.is

D.was

点击查看答案
第5题
He () a boy informing his mother of his secure arrival.

A.asked

B.delieved

C.sent

D.appointed

点击查看答案
第6题
negotiation substantial commission exaggerate competitive donation finance reject brib

negotiation substantial commission exaggerate competitive

donation finance reject bribery impose

secure withdraw discount concerning

点击查看答案
第7题
Hackers can do this because ______.A.computers are hard to reachB.everyone has their compu

Hackers can do this because ______.

A.computers are hard to reach

B.everyone has their computers locked

C.computers are not very secure

D.companies ask them to do it

点击查看答案
第8题
Which of the following statement(s) is/are TRUE regarding lashing requirements to secure v

Which of the following statement(s) is/are TRUE regarding lashing requirements to secure vehicles aboard Ro-Ro vessels?

A.It is imperative that the securing of cargo on flats and trailers and in containers be adequate for both road and sea motions

B.The movements experienced by road borne cargo differ significantly from the roll and sway movements of a ship at sea

C.It is necessary for adequate number and strength of securing points on the vehicles themselves in order that lashings may be properly and safely utilized

D.All the above

点击查看答案
第9题
Harry Houdini was once locked in prison, being bound in chains, as______.A.he was accused

Harry Houdini was once locked in prison, being bound in chains, as______.

A.he was accused of crimes and was arrested by police in Chicago

B.he wanted to show to the police how skillful he was at escaping

C.the police wanted to know whether their prison was secure

D.the police wanted to see whether he could escape with nothing on

点击查看答案
第10题
To "shore up" the main deck for the stowage of deck cargo means to ______.A.weld pad eyes

To "shore up" the main deck for the stowage of deck cargo means to ______.

A.weld pad eyes on deck in proper position to secure the cargo

B.strengthen the main deck by placing pillars underneath it in the tween-decks

C.distribute the weight of the cargo by placing fore-and-aft planks on the main deck

D.package the cargo in wooden crates so it will not damage the deck

点击查看答案
第11题
选出应填入下面一段英语中______内的正确答案。 Public Key Infrastructure (PKI) service providers offer

选出应填入下面一段英语中______内的正确答案。

Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation oftransaction.

eToken enables the users of PKI systems to generate and store(1)and digital certifications inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perfonn sensitive on-chip(2)operations, ensuring that users' keys are never exposed to PC environment, eToken eliminates the need to store(3)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet, assuring peace-of-mind and confidence during online communications.

A digital signature is created using the private key of an individual to ensure the validity of his request. This technology can be used to guarantee(4)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken PRO offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.

The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(5)verifies the certificate using the CA's public key. If the sender's public key is legitimate, the recipient verifies the message's signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.

点击查看答案
退出 登录/注册
发送账号至手机
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改