An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents.
Which of the following would assist Company.com with its goal?
A.
Certificate pinning
B.
Certificate stapling
C.
Certificate chaining
D.
Certificate with extended validation