The key management organization has implemented a key escrowing function. Which of the following technologies can provide protection for the PKI’s escrowed keys?
A. CRL
B. OCSP
C. TPM
D. HSM
2 Comments on “Which of the following technologies can provide protection for the PKI’s escrowed keys?”
An HSM securely stores cryptographic keys.
0
0
CRL is correct answer.
0
0