Pete, a security analyst, must authenticate himself and his company when obtaining a certificate. Which of the following would validate this information for Pete?

A. Certification authority
B. Key escrow
C. Registration authority
D. Trust model


Ans: C. Registration authority

Computer Science & Information Technology

You might also like to view...

Comments in Alice are instructions for the computer to take into account while it is executing a program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In 1973, the developers of UNIX revised it by writing it in assembly language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A _____is a line of punctuation characters, such as periods, that fills the area between text and a tab stop.

A. loader B. leader C. ruler D. stopper

Computer Science & Information Technology

The CSS specification recommends a scaling factor of ____ between font sizes for the computer display.

A. 1.1 B. 1.2 C. 1.3 D. 1.5

Computer Science & Information Technology