Which of the following should a security technician implement to identify untrusted certificates?

Which of the following should a security technician implement to identify untrusted certificates?

Which of the following should a security technician implement to identify untrusted certificates?

A.
CA

B.
PKI

C.
CRL

D.
Recovery agent

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *