Question: Removes excessive processing required of symmetric encryption. What actions should be taken when a private key associated with a certificate has been compromised? ( Select

Removes excessive processing required of symmetric encryption.
What actions should be taken when a private key associated with a certificate has been compromised? (Select Two.)
Add the key to a certificate revocation list by informing the certificate authority.
Create a new application and let the existing application stay in place.
Rotate the key on the compromised application.
Generate a new key pair and obtain a new certificate for the public key.
mplement an automatic system to manage keys and certificates.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

When a private key associated with a certificate has been compromised taking appropriate actions is ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!