A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable.Which of the following MUST be implemented to support this requirement?
A. CSR
B. OCSP
C. CRL
D. SSH
Answer: C. CRL
You might also like to view...
Investigate the SQL dialect on any DBMS that you are currently using. Determine the system’s compliance with the DDL statements in the ISO standard. Investigate the functionality of any extensions the DBMS supports. Are there any functions not supported?
What will be an ideal response?
____________________ sensors are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
Fill in the blank(s) with the appropriate word(s).
Contextual tabs only appear when a certain type of object is selected.
Answer the following statement true (T) or false (F)
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.
Fill in the blank(s) with the appropriate word(s).