A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable.Which of the following MUST be implemented to support this requirement?

A. CSR
B. OCSP
C. CRL
D. SSH

Answer: C. CRL

Computer Science & Information Technology

You might also like to view...

Supply chain management systems are a type of transaction processing system.

Indicate whether the statement is true or false.

Computer Science & Information Technology

Match the following steps to their processes:

I. Step 1 II. Step 2 III. Step 3 IV. Step 4 V. Step 5 A. Results of processing are stored in RAM B. Processed data is displayed on the monitor or printed C. The user types words, numbers, or commands into the computer D. The data, program, and commands are stored in RAM E. The processor takes data from RAM and processes it according to program instructions and/or user input

Computer Science & Information Technology