adplus-dvertising
frame-decoration

Question

A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____

a.

time stamping

b.

polling

c.

caching

d.

squeezing

Answer: (c).caching

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save...

Similar Questions

Discover Related MCQs

Q. How many handshake rounds are required in the Public-Key Distribution Scenario?

Q. “Conveys any desired X.500 directory attribute values for the subject of this certificate.”
Which Extension among the following does this refer to?

Q. The criticality indicator indicates whether an extension can be safely ignored.

Q. Which of the following is not a part of an Extension?

Q. CRL stands for

Q. It is desirable to revoke a certificate before it expires because

Q. Certificates generated by X that are the certificates of other CAs are Reverse Certificates.

Q. Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –

Q. Which of the following is not an element/field of the X.509 certificates?

Q. The subject unique identifier of the X.509 certificates was added in which version?

Q. Extensions were added in which version?

Q. Publicly Available directory is more secure than which other system?

Q. Which system uses a trusted third party interface?

Q. Which of these systems use timestamps as an expiration date?

Q. Which systems use a timestamp?

i) Public-Key Certificates
ii) Public announcements
iii) Publicly available directories
iv) Public-Key authority

Q. Which of the following public key distribution systems is most secure?

Q. USENET is related to which of the following Public Key distribution schemes?

Q. PGP makes use of which cryptographic algorithm?

Q. What is the PGP stand for?

Q. Which one of the following is not a public key distribution means?