Why do you think digital certificates are not used

Assignment Help Management Information Sys
Reference no: EM13998021

Viewing Digital Certificates

For this assignment, you will view digital certificate information using Microsoft Internet Explorer. Follow the step-by-step guide in the attached instructions. In a

Microsoft Word document or Rich Text Format (RTF) file, answer the following questions:

  1. Why do you think digital certificates are not used on Google's home page (www.google.com)? Should they be?
  2. What protocol is being used when you navigated to gmail.google.com? Why did that automatically occur?
  3. What is different about the information exchanged through e-mail and through a search engine?
  4. What are the valid dates of the certificate for gmail.google.com?
  5. Why is this site not concerned with distributing the public key? How does embedding the public key in a digital certificate protect it from impersonators?
  6. What are the valid dates of the root certificate? Why is the expiration date of the root certificate longer than that of the Web site certificate?
  7. Why are there so many certificates listed in the Trusted Root Certificate Authorities?
  8. Under the "Export Format," what is the default format?
  9. To which PKCS format can this information be downloaded? Why this format only?

Reference no: EM13998021

Questions Cloud

Describe the differences between disk quotas : Describe the differences between disk quotas and File Server Resource Manager. What are the requirements of using FSRM?Using Distributed File System, copies of files are stored on different servers. Does DFS eliminate the need to do data backups? Why..
Write pseudocode using a two dimensional array : Write pseudocode using a two dimensional array, that will fill that array with random numbers, find the largest number in each column, the smallest number in each row
Keep ventilation holes clear of dust : What can you use to keep ventilation holes clear of dust?. Which of the MSDS hazard rating is least hazardous?3. Which MSDS personal protection rating recommends goggles,gloves and other protective wear?
A proprietary system a cloud based system : A proprietary system?A cloud based system?An open source system?
Why do you think digital certificates are not used : Why do you think digital certificates are not used on Google's home page (www.google.com)? Should they be?What protocol is being used when you navigated to gmail.google.com? Why did that automatically occur?What is different about the information exc..
Why do organizations develop it systems : Why do organizations develop IT systems?"  Consider what you believe to be the five most important reasons organizations develop IT systems.
Are cloud resources the best it solutions : Are cloud resources the best IT solutions for today's management of IT?
How hard is the ist 195 final : How hard is the IST 195 final? The professor made it seem pretty challenging.
Compare the advantages and disadvantages of atm : Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Designing and installing an information system

Write 250 to 500 word essay, describe the four components of an information system. Why is it important to consider each of them when designing and installing an information system

  What process flow structures are prevalent in a hospital

what process flow structures are prevalent in a hospital organization?are the process flow structures appropriate?how

  Increased connectivitythe advantages of increased

increased connectivitythe advantages of increased connectivity i.e. improve linage and interoperability are readily

  Design of user interfaces - systems analysis and design

Discuss the design of user interfaces is of critical importance in systems analysis and design

  Define the main modules of the system

Define the main modules of the system (User accounts /profiling system, Ordering system, product information system, contact system, consumer support system) Define the "common" and "different" features of the systems

  Prepare a presentation on effectiveness of technology

Prepare a presentation on Effectiveness of Technology

  Information security program

In order for an Information Security program to be successful within an organization it must relate to the mission. CyberSecurity should not prevent an organization from accomplishing its mission or meeting the needs of their customer.

  Describe the impact of telecommuting on energy conservation

Describe the impact of telecommuting on energy conservation, IT operational costs, "green computing", and shifts in telecommuters' lifestyles (e.g., parents, disability, etc.)

  Analyze case study supporting mobile health clinics the

analyze case study supporting mobile health clinics the childrens health fund of new york city examine the case study

  Health care information systemso describe two types of

health care information systemso describe two types of health care information systemso analyze the impact of their

  Bead bar security threatsanswer the folowing questions in

bead bar security threatsanswer the folowing questions in regard to the bead bar company. explain your answers.1-what

  Show what problems can mrp create for suppliers

Show What problems can MRP create for suppliers as you go upstream in the supply chain?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd