You can ____________ the private key of specific certificates when they are issued. Doing so enables the key to be recovered later should it be lost in any way, such as by corruption or accidental deletion
a. Copy
b. Archive
c. Lock
d. Overwrite
B. An archived key is stored in the CA's database until it is needed for key recovery.
Computer Science & Information Technology
You might also like to view...
The Peek method determines whether a file contains another character to read.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The selection sort algorithm repeatedly moves the smallest element from the unsorted list to the top of the unsorted list.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology