A CRL is comprised of.

A. Malicious IP addresses.
B. Trusted CA's.
C. Untrusted private keys.
D. Public keys


Answer: D. Public keys

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 8-1James created a table of his school soccer team schedule that will be placed on the team's Web page. The table contains four columns: Opponent, Home/Away, Date, and Start Time. The table will contain 10 rows. James has some problems with formatting the table and asks Kyra to help him resolve them.James also wants to highlight rows with team home games, and Kyra gives him several options. Which option is correct?

A. Within the tags for each home game row, include the attribute bgcolor="yellow". B. Create a class that contains the statement background-color: yellow; and apply this class to all odd rows, placing home games there. C. Create a class that contains the statement background-color: yellow; and apply this class to home game rows. D. all of the above

Computer Science & Information Technology

In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

At the local university, the girls outnumber the boys 7 to 6. If there are 3,720 boys enrolled at the university, how many girls are enrolled?

A. girls
B. girls
C. girls
D. girls
E. girls

Computer Science & Information Technology

Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A. middleware B. capsules C. macros D. applets

Computer Science & Information Technology