Which of the following technologies can provide protection for the PKI’s escrowed keys?

The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?

The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?

A.
CRL

B.
OCSP

C.
TPM

D.
HSM



Leave a Reply to Dugan Nash Cancel reply2

Your email address will not be published. Required fields are marked *

1 × three =


Dugan Nash

Dugan Nash

An HSM securely stores cryptographic keys.

Mike

Mike

CRL is correct answer.