Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"?

A. CRL
B. PKI
C. OCSP
D. RA


Answer: C. OCSP

Computer Science & Information Technology

You might also like to view...

A value-returning statement must have a(n) ____________ statement.

a. return b. assignment c. logical d. void

Computer Science & Information Technology

Windows 10 is an example of application software.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is y after the following statement is executed?

``` x = 0; y = (x > 0) ? 10 : -10; /code} a. -10 b. 0 c. 10 d. 20 e. Illegal expression

Computer Science & Information Technology

A trademark protects inventions

Indicate whether the statement is true or false

Computer Science & Information Technology