Which of the following can be used to warn users about the malicious activity?

A CA is compromised and attacks start distributing maliciously signed software updates. Which of
the following can be used to warn users about the malicious activity?

A CA is compromised and attacks start distributing maliciously signed software updates. Which of
the following can be used to warn users about the malicious activity?

A.
Key escrow

B.
Private key verification

C.
Public key verification

D.
Certificate revocation list

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three × 4 =