A CRL is comprised oF.
A.
Malicious IP addresses.
B.
Trusted CA’s.
C.
Untrusted private keys.
D.
Public keys.
Explanation:
A CRL is comprised oF.
A CRL is comprised oF.
A.
Malicious IP addresses.
B.
Trusted CA’s.
C.
Untrusted private keys.
D.
Public keys.
Explanation: