Which of the following can be used to warn users about the malicious activity?

A CA is compromised and attacks start distributing maliciously signed software updates. Which of
the following can be used to warn users about the malicious activity?

A CA is compromised and attacks start distributing maliciously signed software updates. Which of
the following can be used to warn users about the malicious activity?

A.
Key escrow

B.
Private key verification

C.
Public key verification

D.
Certificate revocation list



Leave a Reply 0

Your email address will not be published. Required fields are marked *

4 × four =