Which of the following is responsible for verifying the identity of an individual and also issuing the certificate?
Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?