The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
A.
CRL
B.
OCSP
C.
TPM
D.
HSM
The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
The key management organization has implemented a key escrowing function. Which of the following
technologies can provide protection for the PKI’s escrowed keys?
A.
CRL
B.
OCSP
C.
TPM
D.
HSM
An HSM securely stores cryptographic keys.
CRL is correct answer.