__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.
A. Authority key identifier
B. Key usage
C. Subject key identifier
D. Certificate policies
B. Key usage
You might also like to view...
The Quick Style gallery is located on the Quick Access toolbar
Indicate whether the statement is true or false
Which of the following statements about layered security approach is true?
a. The perimeter is secured, but the systems within the perimeter are vulnerable. b. The systems within the perimeter are secured, but the perimeter is vulnerable. c. Both the perimeter and the individual systems within the perimeter are secured. d. Both the perimeter and the individual systems within the perimeter are vulnerable.
The Office Clipboard is a tool that helps you copy Access data to other applications.
Answer the following statement true (T) or false (F)
Which of the following is a measure of biometrics performance which rates the ability of a system to correctly authenticate an authorized user?
A. Failure to capture B. Type II C. Mean time to register D. Template capacity