The security administrator generates a key pair and sends one key inside a request file to a third party. The
third party sends back a signed file. In this scenario, the file sent by the administrator is a:
A.
CA.
B.
CRL.
C.
KEK.
D.
PKI.
E.
CSR.