The key management organization has implemented a key escrowing function. Which of the following technologies can provide protection for the PKI's escrowed keys?

A. CRL
B. OCSP
C. TPM
D. HSM

Answer: A. CRL

Computer Science & Information Technology

You might also like to view...

The final connection to a customer's home or place of business is referred to as the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Jeff, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?

A. SSID masking B. PPPoE C. Transmission power D. Encryption technology

Computer Science & Information Technology