__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.

A. Authority key identifier
B. Key usage
C. Subject key identifier
D. Certificate policies

B. Key usage

Computer Science & Information Technology

You might also like to view...

Which conditional formatting option is not found in the Quick Analysis Gallery?

A) Duplicate Values B) Undo Format C) Unique Values D) Text Contains

Computer Science & Information Technology

The audit _______ are a permanent store of security-related events on a system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology