An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance.Which of the following should the security analyst recommend is lieu of an OCSP?

A. CSR
B. CRL
C. CA
D. OID


Answer: B. CRL

Computer Science & Information Technology

You might also like to view...

Which of the following can be described as an operating system that runs in a virtual machine?

A. hypervisor B. guest C. host D. NAS

Computer Science & Information Technology

The ethical theory that states that deities are all-knowing and set moral truth is

a. utilitarianism. b. virtue ethics. c. deontology. d. divine command theory.

Computer Science & Information Technology

(TicTacToe Class) Create a class TicTacToe that will enable you to write a complete program to play the game of tic-tac-toe. The class contains as private data a 3-by-3 two-dimensional array of integers. The constructor should initialize the empty board to all zeros. Allow two human players. Wherever the first player moves, place a X in the specified square. Place an O wherever the second player

moves. Each move must be to an empty square. After each move, determine whether the game has been won or is a draw. If you feel ambitious, modify your program so that the computer makes the moves for one of the players. Also, allow the player to specify whether he or she wants to go first or second. If you feel exceptionally ambitious, develop a program that will play three-dimen- sional tic-tac-toe on a 4-by-4-by-4 board. [Caution: This is an extremely challenging project that could take many weeks of effort!] What will be an ideal response?

Computer Science & Information Technology

Distinguish between systems software and applications software.

What will be an ideal response?

Computer Science & Information Technology