A CRL is composed of:

A. Malicious IP address
B. Trusted CA's
C. untrusted private keys
D. Public keys


Ans: D. Public keys

Computer Science & Information Technology

You might also like to view...

Which of the following is not a key organization in the open-source community?

a. Apache. b. Mozilla. c. Firefox. d. Eclipse.

Computer Science & Information Technology

What does an activity diagram depict?

What will be an ideal response?

Computer Science & Information Technology

To google means to look up information on the Web

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ command, which is found on the Menu bar, allows the user to check for product updates

A) Help B) Edit C) File D) Tools

Computer Science & Information Technology