A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.
A. self-signed path
B. certificate verification
C. certification path
D. CA's path
Answer: C
You might also like to view...
Answer the following questions true (T) or false (F)
1. One can use the & operator to extract the value that a pointer points to. 2. When declaring several pointer variables, there must be one pointer declarator * for each pointer variable.
Rosanna has assembled her new personal computer. While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.
A. ?encrypted flash drive B. ?surge suppressor C. ?ruggedized drive D. ?kill switch
Named after two protocols, ____________________ is really a protocol suite designed to work together.
Fill in the blank(s) with the appropriate word(s).
A(n) ____________________ is a follow-up question intended to get more information from a user about a problem.
Fill in the blank(s) with the appropriate word(s).