__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.

A. Authority key identifier
B. Key usage
C. Subject key identifier
D. Certificate policies


B. Key usage

Computer Science & Information Technology

You might also like to view...

The Quick Style gallery is located on the Quick Access toolbar

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following statements about layered security approach is true?

a. The perimeter is secured, but the systems within the perimeter are vulnerable. b. The systems within the perimeter are secured, but the perimeter is vulnerable. c. Both the perimeter and the individual systems within the perimeter are secured. d. Both the perimeter and the individual systems within the perimeter are vulnerable.

Computer Science & Information Technology

The Office Clipboard is a tool that helps you copy Access data to other applications.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a measure of biometrics performance which rates the ability of a system to correctly authenticate an authorized user?

A. Failure to capture B. Type II C. Mean time to register D. Template capacity

Computer Science & Information Technology