List the three PKI trust models that use a CA.
What will be an ideal response?
The models are the hierarchical trust model, the distributed trust model, and the bridge trust model.
Computer Science & Information Technology
You might also like to view...
A(n) ________ list sequences items in a list by displaying successive indicators beside each item
Fill in the blank(s) with correct word
Computer Science & Information Technology
Packets sent to a ________ address do not leave the IPv6 subnet
A) Unique local B) Link-local C) Global unicast D) Multicast
Computer Science & Information Technology