Here I am providing the answer for the above questions:
1.
the public key infrastructure(PKI) involves a hierachy of CAs,for example:the root CA certifies the Regional Authorities(RAs),which may have local CAs under them;that is necessary because a single CA cannot handle the load of the entire Internet.
2.
a) Authentication is a technique by which a process verifies that its communication partner is who it is supposed to be(and not an imposer)
d) authentication with Kerberos is based on the model of three headed dog from the Greek mythology,Where each head involved 3 steps.
Hoping that the above answers will help you...Thank you..
D Question 18 4 pts Which of the following statements is incorrect about Management of Public...
1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...