After setting up a root CA. which of the following can Pete, a security administrator, implement to allow intermediate CAs to handout keys and certificates?
A. CRL
B. Spanning tree
C. Trust model
D. Key escrow
Ans: C. Trust model
Computer Science & Information Technology
You might also like to view...
Explain how adaptability to new technologies can be taken into consideration when selecting devices for a LAN. How does this affect the cost calculations?
What will be an ideal response?
Computer Science & Information Technology
When the Show Formulas button is on, the ________ of a date appears in the worksheet cell
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The ________ function returns a specified number of characters, starting from the right side of the data
A) LEFT B) MID C) TRIM D) RIGHT
Computer Science & Information Technology
To move or nudge a selected picture in very small increments, hold down the ____ key while pressing the UP ARROW, DOWN ARROW, RIGHT ARROW, or LEFT ARROW.
A. TAB B. ALT C. CTRL D. SHIFT
Computer Science & Information Technology