Pete, a security analyst, must authenticate himself and his company when obtaining a certificate. Which of the following would validate this information for Pete?
A. Certification authority
B. Key escrow
C. Registration authority
D. Trust model
Ans: C. Registration authority
Computer Science & Information Technology
You might also like to view...
Comments in Alice are instructions for the computer to take into account while it is executing a program.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In 1973, the developers of UNIX revised it by writing it in assembly language.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A _____is a line of punctuation characters, such as periods, that fills the area between text and a tab stop.
A. loader B. leader C. ruler D. stopper
Computer Science & Information Technology
The CSS specification recommends a scaling factor of ____ between font sizes for the computer display.
A. 1.1 B. 1.2 C. 1.3 D. 1.5
Computer Science & Information Technology