What are two common methods when using a public key infrastructure for maintaining access to servers in a network?

What are two common methods when using a public key infrastructure for maintaining access to servers in a network?

What are two common methods when using a public key infrastructure for maintaining access to servers in a network?

A.
ACL and PGP.

B.
PIM and CRL.

C.
CRL and OCSP.

D.
RSA and MD2

Explanation:
The process of revoking a certificate begins when the CA is notified that a particular certificate needs to be revoked. The CA marks the certificate as revoked. This information is published in the CRL and becomes available using OCSP.
Reference: Security + (SYBEX) page 338



Leave a Reply 0

Your email address will not be published. Required fields are marked *