The security administrator generates a key pair and sends one key inside a rest file to a third party. The third party sends back a signed file. In this scenario, the file sent by the administrator is a:
A. CA
B. CRL
C. KEK
D. PKI
E. CSR
Ans: E. CSR
Computer Science & Information Technology
You might also like to view...
The toupper() library function converts only lowercase letters.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is the process called when sensitive material is removed automatically from outgoing emails?
A. scrapping B. sanitizing C. filtering D. profiling
Computer Science & Information Technology
What is a hardware concern of emulation?
What will be an ideal response?
Computer Science & Information Technology
A soft copy is information that exists on a physical medium such as paper.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology