After setting up a root CA. which of the following can Pete, a security administrator, implement to allow intermediate CAs to handout keys and certificates?

A. CRL
B. Spanning tree
C. Trust model
D. Key escrow


Ans: C. Trust model

Computer Science & Information Technology

You might also like to view...

Explain how adaptability to new technologies can be taken into consideration when selecting devices for a LAN. How does this affect the cost calculations?

What will be an ideal response?

Computer Science & Information Technology

When the Show Formulas button is on, the ________ of a date appears in the worksheet cell

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ function returns a specified number of characters, starting from the right side of the data

A) LEFT B) MID C) TRIM D) RIGHT

Computer Science & Information Technology

To move or nudge a selected picture in very small increments, hold down the ____ key while pressing the UP ARROW, DOWN ARROW, RIGHT ARROW, or LEFT ARROW.

A. TAB B. ALT C. CTRL D. SHIFT

Computer Science & Information Technology