A security technician is implementing PKI on a Network. The technician wishes to reduce the
amount of bandwidth used when verifying the validity of a certificate. Which of the following should
the technician implement?
A.
CSR
B.
Key escrow
C.
OSCR
D.
CRL
Explanation: