In which of the following scenarios is PKI LEAST hardened?

A. The CRL is posted to a publicly accessible location.
B. The recorded time offsets are developed with symmetric keys.
C. A malicious CA certificate is loaded on all the clients.
D. All public keys are accessed by an unauthorized user.


Ans: C. A malicious CA certificate is loaded on all the clients.

Computer Science & Information Technology

You might also like to view...

Tap or click the Options box arrow to display the status options, as shown in the accompanying figure.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What will happen if you type man man in Linux?

What will be an ideal response?

Computer Science & Information Technology

Define each of the following terms:

a) Web-based training b) name-your-price model c) shopping cart d) reverse auction e) redundancy f) high-availability computing g) merchant server

Computer Science & Information Technology

________ is a keyboard shortcut for bolding text

A) Ctrl + B B) Shift + B C) Ctrl + D D) Ctrl + I

Computer Science & Information Technology