Which of the following should Matt, a security technician, implement to identify untrusted certificates?

A. CA
B. PKI
C. CRL
D. Recovery agent

Answer: C. CRL

Computer Science & Information Technology

You might also like to view...

A query that removes records from a table is called a(n) _________ query

A) delete B) append C) update D) select

Computer Science & Information Technology

Match the following terms to their meanings:

I. Files that can be accessed by all computers on a network A. shared resource II. A device connected to a computer that can be accessed B. encryption by other computers III. Rules that determine who can share network resources C. troubleshoot IV. Scrambling the contents of a message to ensure that only D. permissions the sender can read it V. Analyzing a problem and developing a solution E. Public folder

Computer Science & Information Technology