A company is concerned that a compromised certificate may result in a man-in-the-middle attack against
backend financial servers. In order to minimize the amount of time a compromised certificate would be
accepted by other servers, the company decides to add another validation step to SSL/TLS connections. Which
of the following technologies provides the FASTEST revocation capability?
A.
Online Certificate Status Protocol (OCSP)
B.
Public Key Cryptography (PKI)
C.
Certificate Revocation Lists (CRL)
D.
Intermediate Certificate Authority (CA)