____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.

A. Name constraints
B. Policy mappings
C. Policy constraints
D. Basic constraints


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) ____ backup makes backup copies of files as they are added or changed.

A. auto B. manual C. system D. incremental

Computer Science & Information Technology

A Background in a Worksheet looks like a ________

A) graphic instead of the data on the worksheet B) graphic display on top of the data C) graphic inserted in the top left corner D) webpage with a graphic behind the data

Computer Science & Information Technology

NAT extended the useful life of IPv4 addresses on the Internet for many years.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which search matches the events containing the terms "error" and "fail"?

A. index=security Error Fail B. index=security error OR fail C. index=security "error failure" D. index=security NOT error NOT fail

Computer Science & Information Technology