A security administrator receives notice that a third-party certificate authority has been compromised, and new certificates will need to be issued.Which of the following should the administrator submit to receive a new certificate?

A. CRL
B. OSCP
C. PFX
D. CSR
E. CA


Answer: D. CSR

Computer Science & Information Technology

You might also like to view...

Each TextField has a text property that’s returned by its textProperty method as a StringProperty. The StringProperty method ________ receives an ObservableValue as an argument. When the ObservableValue changes, the bound property is updated accordingly.

a. tie b. join c. attach d. bind

Computer Science & Information Technology

Which of the following uses ICMPv6 type 135 messages?

A. Router Solicitation B. Router Advertisement C. Neighbor Advertisement D. Neighbor Solicitation

Computer Science & Information Technology

Removing blank space or “dead air” at the beginning or end of a recording is sometimes called:

a. quieting b. pre-rolling c. quantizing d. trimming e. flashing

Computer Science & Information Technology

If a command has its own executable file, it is called a(n) _______________ program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology