An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?
A. Certificate pinning
B. Certificate stapling
C. Certificate chaining
D. Certificate with extended validation
Answer: A. Certificate pinning
Computer Science & Information Technology
You might also like to view...
Code after a return or a call to the exit function is executed will not be executed.
What will be an ideal response?
Computer Science & Information Technology
The _________ tool provides a way to locate text and replace it
Fill in the blank(s) with correct word
Computer Science & Information Technology
The capitalization for a complimentary close with two words is illustrated correctly in the following example: Sincerely yours
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In a preliminary investigation report, the _____ section is included in the report if supporting information must be attached.?
A. ?appendix B. ?introduction C. ?recommendations D. ?findings
Computer Science & Information Technology