A CA certificate signed by another CA's private key is referred as a(n) ____.

A. self-signed CA
B. root CA
C. intermediate CA
D. top-level CA


Answer: C

Computer Science & Information Technology

You might also like to view...

To access a file in a program, it is necessary to know both ___________ and ________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

According to ____ we should adopt a set of rules and then violate them only in the case where compelling evidence indicates that utility is increased by such a violation.

A. Rule Utilitarianism B. Happiness Theory C. Contractarianism D. "Tit-for-Tat" Theory

Computer Science & Information Technology

Does entering Dim intValue = 1 provide an error in Visual Basic 2010? Explain why or why not, and the significance of this.

What will be an ideal response?

Computer Science & Information Technology

How to Excel understand your number as a text?

a. None of the others b. Use a bracket at begin of your number c. Use a semi-colon at begin of your number d. Use a quotes at begin of your number

Computer Science & Information Technology