Joe, a user, wants to configure his work station to make certain that the certificate he receives when connecting to websites is still valid. Which of the following
should Joe enable on his workstation to achieve this?

A.
Certificate revocation
B.
Key escrow
C.
Registration authority
D.
Digital signatures