An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?

A. Certificate pinning
B. Certificate stapling
C. Certificate chaining
D. Certificate with extended validation

Answer: A. Certificate pinning

Computer Science & Information Technology

You might also like to view...

What is an external sort?

What will be an ideal response?

Computer Science & Information Technology

There are many methods for coding colors, but the simplest code uses ____________________ bytes of data for each pixel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology