Which of the following is not a required PKI component but identifies the CA and describes the security practices in place for maintaining CA integrity?
A. Online Responder
B. Root CA
C. Certificate Practice Statement
D. Authority Information Access
Answer: C
You might also like to view...
A ________ is an association that is established between two tables using common fields
Fill in the blank(s) with correct word
An administrator thinks the UNIX systems may be compromised, but a review of system log files provides no useful information. After discussing the situation with the security team, the administrator suspects that the attacker may be altering the log files and removing evidence of intrusion activity.Which of the following actions will help detect attacker attempts to further alter log files?
A. Enable verbose system logging B. Change the permissions on the user's home directory C. Implement remote syslog D. Set the bash_history log file to "read only"