The key management organization has implemented a key escrowing function. Which of the following technologies can provide protection for the PKI's escrowed keys?
A. CRL
B. OCSP
C. TPM
D. HSM
Answer: A. CRL
Computer Science & Information Technology
You might also like to view...
The final connection to a customer's home or place of business is referred to as the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Jeff, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?
A. SSID masking B. PPPoE C. Transmission power D. Encryption technology
Computer Science & Information Technology