A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject AlternativeName (SAM) attribute of a certificate?

A. It can protect multiple domains
B. It provides extended site validation
C. It does not require a trusted certificate authority
D. It protects unlimited subdomains


Answer: B. It provides extended site validation

Computer Science & Information Technology

You might also like to view...

The purpose of the ________ element is used to configure the main content of a web page document.

a. header b. nav c. main d. content

Computer Science & Information Technology

To paste a snapshot of an Excel chart or PowerPoint slide, choose the ________ option from the Paste Special menu

A) Formatted Text (RTF) B) Unformatted Text C) HTML Format D) Picture (Enhanced Metafile)

Computer Science & Information Technology

A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from an external source, such as an I/O request, it sends a message searching for the service. While it waits for a response, the processor server puts the process in a ____ state.

A. STOP B. WAIT C. BUSY D. RESPONSE

Computer Science & Information Technology

What is the data range for a 16-bit signed integer?

What will be an ideal response?

Computer Science & Information Technology