Question: Removes excessive processing required of symmetric encryption. What actions should be taken when a private key associated with a certificate has been compromised? ( Select
Removes excessive processing required of symmetric encryption.
What actions should be taken when a private key associated with a certificate has been compromised? Select Two.
Add the key to a certificate revocation list by informing the certificate authority.
Create a new application and let the existing application stay in place.
Rotate the key on the compromised application.
Generate a new key pair and obtain a new certificate for the public key.
mplement an automatic system to manage keys and certificates.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
When a private key associated with a certificate has been compromised taking appropriate actions is ... View full answer
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
