List the three PKI trust models that use a CA.

What will be an ideal response?

The models are the hierarchical trust model, the distributed trust model, and the bridge trust model.

Computer Science & Information Technology

You might also like to view...

A(n) ________ list sequences items in a list by displaying successive indicators beside each item

Fill in the blank(s) with correct word

Computer Science & Information Technology

Packets sent to a ________ address do not leave the IPv6 subnet

A) Unique local B) Link-local C) Global unicast D) Multicast

Computer Science & Information Technology