What common method is used to ensure the security and integrity of a root CA?

A. Keep it in an offline state from the network.
B. Only use the root CA infrequently.
C. Password protect the root CA
D. Keep it in an online state and encrypt it.


Answer: A

Computer Science & Information Technology

You might also like to view...

In most countries, computer software, like a book or movie, is protected by a copyright.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following are true for the CNAME record? (Select two.)

a. It is generally called an alias. b. It maps the MAC address on the Internet. c. It is the reverse of the A record. d. It is also called the canonical record.

Computer Science & Information Technology

?A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

A. ?12 B. ?24 C. ?30 D. ?32

Computer Science & Information Technology

Each of the smaller cycles involves a series of steps, each of which involves the processor registers, referred to as _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology