which of the following?
Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?
Which of the following describes a service that could m…
A security administrator needs a locally stored record to remove the certificates of a terminated employee. Which of the following describes a service that could
meet these requirements?
Which of the following can the finance department check…
The finance department works with a bank which has recently had a number of cyber attacks. The finance department is concerned that the banking website
certificates have been compromised. Which of the following can the finance department check to see if any of the bank’s certificates are still valid?
which of the following should be accessible locally fro…
A systems administrator has implemented PKI on a classified government network. In the event that a disconnect occurs from the primary CA, which of the
following should be accessible locally from every site to ensure users with bad certificates cannot gain access to the network?
Which of the following is the name of the database repo…
Joe, a user, reports to the system administrator that he is receiving an error stating his certificate has been revoked. Which of the following is the name of the
database repository for these certificates?
which of the following would Matt, a security administr…
When reviewing a digital certificate for accuracy, which of the following would Matt, a security administrator, focus on to determine who affirms the identity of the
certificate owner?
Which of the following would issue Pete a certificate?
Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate?
Which of the following is the FIRST step the security a…
A company’s security administrator wants to manage PKI for internal systems to help reduce costs. Which of the following is the FIRST step the security
administrator should take?
Which of the following protocols encapsulates an IP pac…
Which of the following protocols encapsulates an IP packet with an additional IP header?
Which of the following may be used to meet this objective?
A security administrator has been tasked with setting up a new internal wireless network that must use end to end TLS. Which of the following may be used to meet
this objective?