Which of the following technologies can provide protect…

The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?

The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?

A.
CRL

B.
OCSP

C.
TPM

D.
HSM



Leave a Reply 0

Your email address will not be published. Required fields are marked *