Which of the following should Matt, a security technician, implement to identify untrusted certificates?
A. CA
B. PKI
C. CRL
D. Recovery agent
Answer: C. CRL
Computer Science & Information Technology
You might also like to view...
A query that removes records from a table is called a(n) _________ query
A) delete B) append C) update D) select
Computer Science & Information Technology
Match the following terms to their meanings:
I. Files that can be accessed by all computers on a network A. shared resource II. A device connected to a computer that can be accessed B. encryption by other computers III. Rules that determine who can share network resources C. troubleshoot IV. Scrambling the contents of a message to ensure that only D. permissions the sender can read it V. Analyzing a problem and developing a solution E. Public folder
Computer Science & Information Technology