A ________________ is a location on the network from which applications can locate the most recent base and delta CRLs to check for certificate validity

a. PKI share
b. PKI distribution point
c. CRL distribution point
d. CRL share


C. The Extensions tab of the CA's Properties dialog box enables you to add, remove, or modify CDPs in issuing certificates.

Computer Science & Information Technology

You might also like to view...

The most popular database model is the ________ database, in which data is stored in simple tables.

a. network b. graph c. relational d. hierarchical

Computer Science & Information Technology

____ interpolation chooses the best resampling method for you based on the resizing options you choose.

a. Nearest Neighbor b. Bilinear c. Bicubic Automatic d. Bicubic Smoother

Computer Science & Information Technology

What is the purpose of using the null character in a character array?

A. to indicate the end of the data (termination). B. there is no purpose in using the null character in a char array. C. Because null equals 0. D. The null character is mandatory for a clean compile.

Computer Science & Information Technology

Which of the following is a piece of information that can be used to verify an individual's identity and is provided to the system by answering a series of questions based on the user's life, such as favorite color, pet's name, mother's maiden name, and so on?

A. cognitive password B. one-time password C. passphrase D. graphical password

Computer Science & Information Technology