Which of the following would be an effective way to ensure that a compromised PKI key can not
access a system?
A.
Revoke the key
B.
Renew the key
C.
Reconfigure the key
D.
Delete the key
Which of the following would be an effective way to ensure that a compromised PKI key can not
access a system?
Which of the following would be an effective way to ensure that a compromised PKI key can not
access a system?
A.
Revoke the key
B.
Renew the key
C.
Reconfigure the key
D.
Delete the key