The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
A.
CRL
B.
OCSP
C.
TPM
D.
HSM
The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
A.
CRL
B.
OCSP
C.
TPM
D.
HSM