Which of the following identifies certificates that have been compromised or suspected of being compromised?

A. Certificate revocation list
B. Access control list
C. Key escrow registry
D. Certificate authority


Answer: A. Certificate revocation list

Computer Science & Information Technology

You might also like to view...

________ charts are often used to represent data in educational, scientific, and medical experiments

Fill in the blank(s) with correct word

Computer Science & Information Technology

A software ________ is the software release or format

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To rotate an image using the mouse method, click a picture, position the pointer over the rotation handle, then drag the rotation handle in the direction you want to rotate the graphic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case OL 2-1Mary is an assistant for the vice president of Marketing at a large company. She has been asked to create an e-mail that will be sent to customers. Mary was instructed to use HTML format for the e-mail message. Where is this command located?

A. Insert tab B. Message tab C. Options tab D. Format Text tab

Computer Science & Information Technology