A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable.Which of the following MUST be implemented to support this requirement?

A. CSR
B. OCSP
C. CRL
D. SSH


Answer: C. CRL

Computer Science & Information Technology

You might also like to view...

Investigate the SQL dialect on any DBMS that you are currently using. Determine the system’s compliance with the DDL statements in the ISO standard. Investigate the functionality of any extensions the DBMS supports. Are there any functions not supported?

What will be an ideal response?

Computer Science & Information Technology

____________________ sensors are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Contextual tabs only appear when a certain type of object is selected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology