____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.
A. Name constraints
B. Policy mappings
C. Policy constraints
D. Basic constraints
Answer: A
You might also like to view...
The executions of transactions are strict if read and write operations on an object are delayed until all transactions that previously wrote that object have either committed or aborted. Explain how the locking rules in Figure 16.16ensure strict executions.
What will be an ideal response?
To delete an object with the Shape Builder tool, press and hold ____ (Win) then click or drag over the objects you want to delete.
A. [Alt] B. [Ctrl] C. [Shift] D. [Ctrl]+[Alt]
A(n) ________-as-a-Service provides a programming environment in which custom web applications can be developed, tested, and deployed
Fill in the blank(s) with correct word
The ____ behavior is used to change the font, position, borders and shading, and visibility of an object.
A. Call Script B. Change Property/Restore C. Play Sound D. Set Text