You can ____________ the private key of specific certificates when they are issued. Doing so enables the key to be recovered later should it be lost in any way, such as by corruption or accidental deletion
a. Copy
b. Archive
c. Lock
d. Overwrite
B. An archived key is stored in the CA's database until it is needed for key recovery.
Computer Science & Information Technology
You might also like to view...
List nodes normally are not necessarily stored in contiguous memory. Rather, they’re ________ contiguous.
a. physically b. approximately c. comparably d. logically
Computer Science & Information Technology
What is a buffer overflow?
What will be an ideal response?
Computer Science & Information Technology
How many operations will be performed by an algorithm of complexity O(2^n) for n=16?
a. 65,536 b. 256 c. 16 d. 20
Computer Science & Information Technology
Separate 48 into two parts such that the first part is twice the second.
Let first part = n Let second part = 48 — n Equation: n = 2(48 — n) Solve for n n = 96 — 2n 3n = 96 n=96/3 n = 32
Computer Science & Information Technology