A security administrator finds that an intermediate CA within the company was recently breached. The certificates held on this system were lost during the attack, and it is suspected that the attackers had full access to the system. Which of the following is the NEXT action to take in this scenario?

A. Use a recovery agent to restore the certificates used by the intermediate CA
B. Revoke the certificate for the intermediate CA
C. Recover the lost keys from the intermediate CA key escrow
D. Issue a new certificate for the root CA

Answer: B. Revoke the certificate for the intermediate CA

Computer Science & Information Technology

You might also like to view...

When an application is being designed for a company, Windows interface standards can be superseded by ______________.

A. the graphic designer B. usability standards C. the preference of the users D. the company's interface standards

Computer Science & Information Technology

An object must have its own unique identity, which distinguishes it from all other objects in the computer's memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology