If a user reports that the user’s public/private key has been compromised, the CA should issue:
A.
a CRL
B.
an LDAP
C.
a CPS
D.
a PKCS
If a user reports that the user’s public/private key has been compromised, the CA should issue:
If a user reports that the user’s public/private key has been compromised, the CA should issue:
A.
a CRL
B.
an LDAP
C.
a CPS
D.
a PKCS