A security administrator must implement a system to ensure that invalid certificates are not used by a custom
developed application. The system must be able to check the validity of certificates even when internet access
is unavailable.
Which of the following MUST be implemented to support this requirement?

A.
CSR
B.
OCSP
C.
CRL
D.
SSH