Question: A security administrator uses third-party certificate authorities plus their own set of enterprise certificate authorities. How is a list of trusted certificate authorities delivered to
A security administrator uses third-party certificate authorities plus their own set of enterprise certificate authorities. How is a list of trusted certificate authorities delivered to a browser? (Choose all that apply.)
A) Browser manufacturer
B) Registration Authority (RA)
C) Online Certificate Status Protocol (OCSP)
D) Group policy Certificate Authority (CA)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
