A common way to implement certificate distribution in a large company is to provide users with a web interface to request certificates using their Active Directory account. Using this technique, users need only the _______ of the CA to request a personal certificate

a. Name
b. URL
c. Certificate number
d. Account number


B. They can then use it for VPN, e-mail, and other purposes.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. You can delete a key–value pair from a dictionary with the del statement b. You can remove a key–value pair with the dictionary method pop, which re-turns the value for the removed key. c. The one argument version of dictionary method get, normally returns its argument’s corresponding value—if that key is not found, get raises a KeyError. d. Operators in and not in can determine whether a dictionary contains a specified key.

Computer Science & Information Technology

You can continue to adjust motion path starting and stopping points to get the exact effect you want.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is true of DSL?

A. It is a popular digital line alternative for the small business or home user. B. Users share DSL nodes with up to hundreds of other users. C. It uses a line that is shared with other users in the neighborhood. D. It has widespread availability.

Computer Science & Information Technology

In general, issues of personal privacy and public safety are magnified enormously by the capabilities of ____________________ databases.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology