An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?

A. Certificate pinning
B. Certificate stapling
C. Certificate chaining
D. Certificate with extended validation


Answer: A. Certificate pinning

Computer Science & Information Technology

You might also like to view...

Code after a return or a call to the exit function is executed will not be executed.

What will be an ideal response?

Computer Science & Information Technology

The _________ tool provides a way to locate text and replace it

Fill in the blank(s) with correct word

Computer Science & Information Technology

The capitalization for a complimentary close with two words is illustrated correctly in the following example: Sincerely yours

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a preliminary investigation report, the _____ section is included in the report if supporting information must be attached.?

A. ?appendix B. ?introduction C. ?recommendations D. ?findings

Computer Science & Information Technology