The security administrator generates a key pair and sends one key inside a rest file to a third party. The third party sends back a signed file. In this scenario, the file sent by the administrator is a:

A. CA
B. CRL
C. KEK
D. PKI
E. CSR


Ans: E. CSR

Computer Science & Information Technology

You might also like to view...

The toupper() library function converts only lowercase letters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the process called when sensitive material is removed automatically from outgoing emails?

A. scrapping B. sanitizing C. filtering D. profiling

Computer Science & Information Technology

What is a hardware concern of emulation?

What will be an ideal response?

Computer Science & Information Technology

A soft copy is information that exists on a physical medium such as paper.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology