Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"?
A. CRL
B. PKI
C. OCSP
D. RA
Answer: C. OCSP
Computer Science & Information Technology
You might also like to view...
A value-returning statement must have a(n) ____________ statement.
a. return b. assignment c. logical d. void
Computer Science & Information Technology
Windows 10 is an example of application software.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is y after the following statement is executed?
``` x = 0; y = (x > 0) ? 10 : -10; /code} a. -10 b. 0 c. 10 d. 20 e. Illegal expression
Computer Science & Information Technology
A trademark protects inventions
Indicate whether the statement is true or false
Computer Science & Information Technology