A ________________ is a location on the network from which applications can locate the most recent base and delta CRLs to check for certificate validity
a. PKI share
b. PKI distribution point
c. CRL distribution point
d. CRL share
C. The Extensions tab of the CA's Properties dialog box enables you to add, remove, or modify CDPs in issuing certificates.
You might also like to view...
The most popular database model is the ________ database, in which data is stored in simple tables.
a. network b. graph c. relational d. hierarchical
____ interpolation chooses the best resampling method for you based on the resizing options you choose.
a. Nearest Neighbor b. Bilinear c. Bicubic Automatic d. Bicubic Smoother
What is the purpose of using the null character in a character array?
A. to indicate the end of the data (termination). B. there is no purpose in using the null character in a char array. C. Because null equals 0. D. The null character is mandatory for a clean compile.
Which of the following is a piece of information that can be used to verify an individual's identity and is provided to the system by answering a series of questions based on the user's life, such as favorite color, pet's name, mother's maiden name, and so on?
A. cognitive password B. one-time password C. passphrase D. graphical password