Using group policy, you can deliver certificates and their associated keys to third-party Root Certification Authorities

Indicate whether the statement is true or false


False —You can use group policy to make certificates available to all computers covered by a GPO, but you cannot distribute certificates to the third-party Root Certification Authorities store.

Computer Science & Information Technology

You might also like to view...

A ____ is an electronic file that contains an organized collection of related information.

A. computer list B. computer database C. computer record D. computer sheet

Computer Science & Information Technology

Which of the following will a well designed and thought-out forensic facility ensure for each new piece of technology that is brought in?

a. It is court approved. b. It undergoes significant testing. c. It goes through a fair bidding process. d. It is recorded in a well-document change control statement.

Computer Science & Information Technology

Users can search online images using ________ Image Search to insert pictures

Fill in the blank(s) with correct word

Computer Science & Information Technology

A potential weakness in an asset or its defensive control system(s) is known as a(n) ?_________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology