Which of the following should a security technician implement to identify untrusted certificates?
A.
CA
B.
PKI
C.
CRL
D.
Recovery agent
Which of the following should a security technician implement to identify untrusted certificates?
Which of the following should a security technician implement to identify untrusted certificates?
A.
CA
B.
PKI
C.
CRL
D.
Recovery agent