Why do you think digital certificates are not used

Assignment Help Management Information Sys
Reference no: EM13998021

Viewing Digital Certificates

For this assignment, you will view digital certificate information using Microsoft Internet Explorer. Follow the step-by-step guide in the attached instructions. In a

Microsoft Word document or Rich Text Format (RTF) file, answer the following questions:

  1. Why do you think digital certificates are not used on Google's home page (www.google.com)? Should they be?
  2. What protocol is being used when you navigated to gmail.google.com? Why did that automatically occur?
  3. What is different about the information exchanged through e-mail and through a search engine?
  4. What are the valid dates of the certificate for gmail.google.com?
  5. Why is this site not concerned with distributing the public key? How does embedding the public key in a digital certificate protect it from impersonators?
  6. What are the valid dates of the root certificate? Why is the expiration date of the root certificate longer than that of the Web site certificate?
  7. Why are there so many certificates listed in the Trusted Root Certificate Authorities?
  8. Under the "Export Format," what is the default format?
  9. To which PKCS format can this information be downloaded? Why this format only?

Reference no: EM13998021

Questions Cloud

Describe the differences between disk quotas : Describe the differences between disk quotas and File Server Resource Manager. What are the requirements of using FSRM?Using Distributed File System, copies of files are stored on different servers. Does DFS eliminate the need to do data backups? Why..
Write pseudocode using a two dimensional array : Write pseudocode using a two dimensional array, that will fill that array with random numbers, find the largest number in each column, the smallest number in each row
Keep ventilation holes clear of dust : What can you use to keep ventilation holes clear of dust?. Which of the MSDS hazard rating is least hazardous?3. Which MSDS personal protection rating recommends goggles,gloves and other protective wear?
A proprietary system a cloud based system : A proprietary system?A cloud based system?An open source system?
Why do you think digital certificates are not used : Why do you think digital certificates are not used on Google's home page (www.google.com)? Should they be?What protocol is being used when you navigated to gmail.google.com? Why did that automatically occur?What is different about the information exc..
Why do organizations develop it systems : Why do organizations develop IT systems?"  Consider what you believe to be the five most important reasons organizations develop IT systems.
Are cloud resources the best it solutions : Are cloud resources the best IT solutions for today's management of IT?
How hard is the ist 195 final : How hard is the IST 195 final? The professor made it seem pretty challenging.
Compare the advantages and disadvantages of atm : Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Robust information management system strategy

Evaluate the importance of a company having a robust information management system strategy. Recommend two (2) actions that a company may take in order to protect its information assets from potential disruption and loss

  Project management and operations managementcompare and

project management and operations managementcompare and contrast project management and operations management. please

  Prepare a summary of given article highlighting key points

Prepare a summary of the article highlighting key points relating to technology and global business. Your summary should be approximately 250-300 words.

  Operations and suplpy chain

Operations and Suplpy Chain - Draw a graph. Develop the equations

  Impact of technology on businessidentify non-software

impact of technology on businessidentify non-software technology that might be useful e.g. robotics for manufacturing

  Write a program that prompts the user

Write a program that prompts the user for the following information inputs. Your program should display these inputs back. Remember, any variable must be declared prior to being used in the program

  Case study on bio-fuel cell technology

Case Study On Bio-Fuel Cell Technology

  Standard protocols and reference modelsexplain the

standard protocols and reference modelsexplain the advantages and disadvantages of using standard protocols and

  A senior information technology analyst

You are a senior information technology analyst at your company. Your company has 250 employees. Each employee has his or her own terminal to access the company's network. There are also 10 wireless access points to support access for portable device..

  What are the key components of systems analysis

What are the key components of systems analysis? How can web designers illustrate web-site design concepts? What does a use case diagram represent?

  A computer network

Least three methods by which you can monitor threats to a computer network. Describe and provide background information each method. Your paper should be between 800 and 1,000 words and should include citations.

  Show benefit of using virtual world to facilitate learning

Write a paper extensively discussing the benefits of using the virtual worlds to facilitate learning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd