A CRL is composed of:

A. Malicious IP address
B. Trusted CA's
C. untrusted private keys
D. Public keys

Ans: D. Public keys

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. Elements of a vector must be of a primitive type, such as int, double, or char. 2. The AbstractSequentialList class provides efficient implementation of sequentially moving through the list at the expense of having inefficient implementation of random access to elements.

Computer Science & Information Technology

InDesign has an index feature.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology