A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.

A. self-signed path
B. certificate verification
C. certification path
D. CA's path


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. One can use the & operator to extract the value that a pointer points to. 2. When declaring several pointer variables, there must be one pointer declarator * for each pointer variable.

Computer Science & Information Technology

Rosanna has assembled her new personal computer. While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.

A. ?encrypted flash drive B. ?surge suppressor C. ?ruggedized drive D. ?kill switch

Computer Science & Information Technology

Named after two protocols, ____________________ is really a protocol suite designed to work together.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ is a follow-up question intended to get more information from a user about a problem.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology