The key management organization has implemented a key escrowing function. Which of the following technologies can provide protection for the PKI's escrowed keys?
A. CRL
B. OCSP
C. TPM
D. HSM
Answer: A. CRL
You might also like to view...
To organize predefined classes so that they can be found more quickly, Java stores related classes in groups called ____.
A. libraries B. collections C. bundles D. packages
State whether or not each of the following statements could be an integrity constraint of a checking account database for a banking application. Give reasons for your answers.
a. The value stored in the balance column of an account is greater than or equal to $0. b. The value stored in the balance column of an account is greater than it was last week at this time. c. The value stored in the balance column of an account is $128.32. d. The value stored in the balance column of an account is a decimal number with two digits following the decimal point. e. The social_security_number column of an account is de?ned and contains a nine-digit number. f. The value stored in the check_credit_in_use column of an account is less than or equal to the value stored in the total_approved_check_credit column. (These columns have their obvious meanings.)
What is wrong with this function?
``` void Divide( int x, int y ) { int remainder, quotient; quotient = x/y; remainder = x%y; return (quotient, remainder); } ``` A. You can’t have a comma in the return statement. B. The return type is void. C. You can’t delare new variables in this function. D. Both A & B.
How many sizing handle are found on embedded charts?
A) 4 B) 10 C) 6 D) 8