____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.

A. Name constraints
B. Policy mappings
C. Policy constraints
D. Basic constraints


Answer: A

Computer Science & Information Technology

You might also like to view...

The executions of transactions are strict if read and write operations on an object are delayed until all transactions that previously wrote that object have either committed or aborted. Explain how the locking rules in Figure 16.16ensure strict executions.

What will be an ideal response?

Computer Science & Information Technology

To delete an object with the Shape Builder tool, press and hold ____ (Win) then click or drag over the objects you want to delete.

A. [Alt] B. [Ctrl] C. [Shift] D. [Ctrl]+[Alt]

Computer Science & Information Technology

A(n) ________-as-a-Service provides a programming environment in which custom web applications can be developed, tested, and deployed

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ behavior is used to change the font, position, borders and shading, and visibility of an object.

A. Call Script B. Change Property/Restore C. Play Sound D. Set Text

Computer Science & Information Technology