A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check t
he validity of certificates even when internet access is unavailable.
Which of the following MUST be implemented to support this requirement?
A. CSR
B. OCSP
C. CRL
D. SSH