1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
14

A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even durin

g an extended internet outage.
Which of the following should be implemented?
A. Recovery agent
B. Ocsp
C. Crl
D. Key escrow
Computers and Technology
1 answer:
Natali [406]3 years ago
5 0

Answer: OCSP

Explanation:

Ocsp(online certificate status protocol) is used to maintain the security status of the server and also to determine the status of SSL/TLS certificates used by the webserver.

You might be interested in
Which role is responsible for turning the product backlog into incremental pieces of functionality? bookmark this question
Misha Larkins [42]
The answer is the team. Teams are self-establishing which no one not even the scrum master tells the team how to turn product backlog into augmentations of stoppable functionality. Each team member put on his or her knowledge to all of the complications. The interaction that outcomes progresses the entire scrum team’s general competence and usefulness. The optimal size for a scrum team is seven people, plus or minus two. When there are fewer than five team members, there is less interface and as a result less productivity improvement. The product owner and scrum master roles are not comprised in this count. Team arrangement may variation at the end of a sprint. Every time Team membership is altered, the productivity increased from self-organization is reduced.
4 0
3 years ago
Read 2 more answers
A person who breaks into a computer, network, or online site is called
dybincka [34]

Answer:

B: Hacker

Explanation:

literally anything else aren't even real things besides hacker.

5 0
2 years ago
Read 2 more answers
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
Helga [31]

Yes I've noticed this. Unfortunately it's up to the user (Asker) to report an answer incorrect.

8 0
3 years ago
Read 2 more answers
Is this free? do i have to pay to use this app??
Virty [35]
No i don’t have to pay but there is additional stuff if you pay but i don’t pay for anything
3 0
3 years ago
Other questions:
  • In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
    6·1 answer
  • NEED HELP FAST
    13·2 answers
  • Jeff has created a table to calculate the cost of raw materials that he purchases monthly. Cell A2 shows the fixed cost of the r
    8·2 answers
  • Identical objects are placed in Beaker A and in Beaker B. The objects float as shown in the diagrams below. What can you conclud
    9·1 answer
  • A business traveler notices there is an extra connector between the keyboard and the computer, in a business center. She has mos
    12·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • I have a very quick question. So im applying for Early college and i need some future educational goals and maybe im just thinki
    6·1 answer
  • Two types of are desktop computers and notebook computer
    11·2 answers
  • Help me to solve please​
    8·2 answers
  • Do small companies need computers? why?<br>​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!