Which of the following would be an effective way to ensure that a compromised PKI key can not access a system?

Which of the following would be an effective way to ensure that a compromised PKI key can not
access a system?

Which of the following would be an effective way to ensure that a compromised PKI key can not
access a system?

A.
Revoke the key

B.
Renew the key

C.
Reconfigure the key

D.
Delete the key



Leave a Reply 0

Your email address will not be published. Required fields are marked *