Which of the following should be submitted to a CA?
An administrator needs to renew a certificate for a web server. Which of the following should be submitted to a
CA?
Which of the following protocols is used to validate wh…
Which of the following protocols is used to validate whether trust is in place and accurate by returningresponses of either “good”, “unknown”, or “revoked”?
Which of the following will help resolve the issue?
A system administrator is notified by a staff member that their laptop has been lost. The laptop contains the
user’s digital certificate. Which of the following will help resolve the issue? (Choose two.)
Which of the following is true about the CRL?
Which of the following is true about the CRL?
Which of the following should a security technician imp…
Which of the following should a security technician implement to identify untrusted certificates?
When employees that use certificates leave the company …
When employees that use certificates leave the company they should be added to the following:
Which of the following identifies certificates that hav…
Which of the following identifies certificates that have been compromised or suspected of being compromised?
Public key certificates and keys that are compromised o…
Public key certificates and keys that are compromised or were issued fraudulently are listed on the following:
Which of the following describes a service that could m…
A security administrator needs a locally stored record to remove the certificates of a terminated employee.
Which of the following describes a service that could meet these requirements?
Which of the following can the finance department check…
The finance department works with a bank which has recently had a number of cyber attacks. The finance
department is concerned that the banking website certificates have been compromised. Which of the following
can the finance department check to see if any of the bank’s certificates are still valid?