When reviewing a digital certificate for accuracy, which of the following would Matt, a security administrator, focus on to determine who affirms the identity of the certificate owner?
A. Trust models
B. CRL
C. CA
D. Recovery agent
Answer: C. CA
Computer Science & Information Technology
You might also like to view...
More unintentional errors occur in applications when the variables are declared using the minimum scope needed.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In Flash, you can use ____ to animate one or more objects in relation to each other.
A. armature transformation B. concatenation C. inverse kinematics D. shape layering
Computer Science & Information Technology
The "W" in the standard 10GBaseSW stands for which type of signaling?
A. LAN B. SONET/WAN C. Wireless D. Radio
Computer Science & Information Technology
________ are programs that combine a variety of visual objects to create attractive, visually interesting presentations.
A. Presentation software B. Desktop publishers C. Spreadsheets D. DBMS
Computer Science & Information Technology