Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?