Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)?
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?