When a certificate is presented for authentication, what three criteria must it meet for authentication to succeed?
What will be an ideal response?
It must be valid, it must be configured for the purpose it's presented for, and it must be issued by a trusted CA.
Computer Science & Information Technology
You might also like to view...
A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type
Indicate whether the statement is true or false
Computer Science & Information Technology
________ force you to practice safe computing and thus prevent a lot of potential problems from affecting a system
A) Keychains B) AUPs C) EFSs D) BitLockers
Computer Science & Information Technology