When reviewing a digital certificate for accuracy, which of the following would Matt, a security administrator, focus on to determine who affirms the identity of the certificate owner?

A. Trust models
B. CRL
C. CA
D. Recovery agent


Answer: C. CA

Computer Science & Information Technology

You might also like to view...

More unintentional errors occur in applications when the variables are declared using the minimum scope needed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In Flash, you can use ____ to animate one or more objects in relation to each other.

A. armature transformation B. concatenation C. inverse kinematics D. shape layering

Computer Science & Information Technology

The "W" in the standard 10GBaseSW stands for which type of signaling?

A. LAN B. SONET/WAN C. Wireless D. Radio

Computer Science & Information Technology

________ are programs that combine a variety of visual objects to create attractive, visually interesting presentations.

A. Presentation software B. Desktop publishers C. Spreadsheets D. DBMS

Computer Science & Information Technology