A security technician is implementing PKI on a Network. The technician wishes to reduce the amount of
bandwidth used when verifying the validity of a certificate. Which of the following should the technician
implement?
A.
CSR
B.
Key escrow
C.
OSCR
D.
CRL