An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)

Last Updated on April 30, 2021 by Admin

An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)

  • 802.1x authentication
  • FTP transfers
  • HTTPS web service
  • local NTP server
  • file and directory access permission
    Answers Explanation & Hints:

    The Public Key Infrastructure (PKI) is a third party-system referred to as a certificate authority or CA. The PKI is the framework used to securely exchange information between parties. Common PKI applications are as follows:

    SSL/TLS certificate-based peer authentication
    Secure network traffic using IPsec VPNs
    HTTPS Web traffic
    Control access to the network using 802.1x authentication
    Secure email using the S/MIME protocol
    Secure instant messaging
    Approve and authorize applications with Code Signing
    Protect user data with the Encryption File System (EFS)
    Implement two-factor authentication with smart cards
    Securing USB storage devices

 

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments