__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.
A. Authority key identifier
B. Key usage
C. Subject key identifier
D. Certificate policies
B. Key usage
Computer Science & Information Technology
You might also like to view...
Which conditional formatting option is not found in the Quick Analysis Gallery?
A) Duplicate Values B) Undo Format C) Unique Values D) Text Contains
Computer Science & Information Technology
The audit _______ are a permanent store of security-related events on a system.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology