Question: A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able
A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable. Which of the following MUST be implemented to support this requirement?
A. CSR
B. OCSP
C. CRL
D. SSH
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
