A CRL is composed of:
A. Malicious IP address
B. Trusted CA's
C. untrusted private keys
D. Public keys
Ans: D. Public keys
Computer Science & Information Technology
You might also like to view...
Which of the following is not a key organization in the open-source community?
a. Apache. b. Mozilla. c. Firefox. d. Eclipse.
Computer Science & Information Technology
What does an activity diagram depict?
What will be an ideal response?
Computer Science & Information Technology
To google means to look up information on the Web
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ command, which is found on the Menu bar, allows the user to check for product updates
A) Help B) Edit C) File D) Tools
Computer Science & Information Technology