After a private key has been compromised, an administrator realized that downloading a CRL once per day was not effective. The administrator wants to
immediately revoke certificates. Which of the following should the administrator investigate?
A.
CSR
B.
PKI
C.
IdP
D.
OCSP