Which of the following components of PKI performs the administrative functions, including verifying the identity of users and organizations requesting a digital certificate?

A) Certification authority
B) Registration authority
C) Client nodes
D) Digital certificate


B) Registration authority

Computer Science & Information Technology

You might also like to view...

What is the difference between static and dynamic data structures?

What will be an ideal response?

Computer Science & Information Technology

Explain how activation records and the program stack are used to manage the invocation of and return from methods.

What will be an ideal response?

Computer Science & Information Technology

After declaring a StreamReader variable, you can use the ____ method to open a sequential access file for input, which automatically creates a StreamReader object.

A. ReadText B. InputText C. GetText D. OpenText

Computer Science & Information Technology

The accompanying figure shows a(n) metaphor sketch.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology