which of the following should be accessible locally from every site to ensure users with bad certificates cann
A systems administrator has implemented PKI on a classified government network. In the event that a
disconnect occurs from the primary CA, which of the following should be accessible locally from every site
to ensure users with bad certificates cannot gain access to the network?
A CRL is comprised of.
A CRL is comprised of.
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized acce
Which of the following MUST be updated immediately when an employee is terminated to prevent
unauthorized access?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following provides a static record of all certificates that are no longer valid?
Which of the following can be used to warn users about the malicious activity?
A CA is compromised and attacks start distributing maliciously signed software updates. Which of the
following can be used to warn users about the malicious activity?
Which of the following can the finance department check to see if any of the bank’s certificates are still v
The finance department works with a bank which has recently had a number of cyber attacks. The finance
department is concerned that the banking website certificates have been compromised. Which of the
following can the finance department check to see if any of the bank’s certificates are still valid?
Which of the following describes a service that could meet these requirements?
A security administrator needs a locally stored record to remove the certificates of a terminated
employee. Which of the following describes a service that could meet these requirements?
which of the following?
Public key certificates and keys that are compromised or were issued fraudulently are listed on which of
the following?
Which of the following identifies certificates that have been compromised or suspected of being compromised?
Which of the following identifies certificates that have been compromised or suspected of being
compromised?
which of the following?
When employees that use certificates leave the company they should be added to which of the
following?