1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
14

A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even durin

g an extended internet outage.
Which of the following should be implemented?
A. Recovery agent
B. Ocsp
C. Crl
D. Key escrow
Computers and Technology
1 answer:
Natali [406]3 years ago
5 0

Answer: OCSP

Explanation:

Ocsp(online certificate status protocol) is used to maintain the security status of the server and also to determine the status of SSL/TLS certificates used by the webserver.

You might be interested in
Which of the following is true about strings?
pickupchik [31]

Answer:

Your answer is option C, or the third option.

They do not let the user type in letters, numbers, and words.

Explanation:

Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.

5 0
3 years ago
____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
nikdorinn [45]

Answer:

c. NSTISSI No. 4011

Explanation:

NSTISSI is an acronym for National Security Telecommunications and Information Systems Security Institute.

It is one of the standards set by the Committee on National Security Systems (CNSS), an intergovernmental agency saddled with the responsibility of setting policies for the security of the IT (information technology) security systems of the United States of America.

NSTISSI No. 4011 presents a comprehensive model for information security and is becoming the evaluation standard for the security of information systems.

Generally, all information technology institutions and telecommunications providers are required by law to obtain a NSTISSI-4011 certification or license because it is a standard for Information Systems Security (INFOSEC) professionals.

8 0
3 years ago
Write a function that takes as input a single parameter storing a list of integers and returns the minimum, maximum, and average
Alex Ar [27]

Answer:

hi im coolkid 1000

Explanation:

just 5 robuk

6 0
3 years ago
How do I get rid of the thing on top? It is driving me INSANE!!
Zinaida [17]
Try restarting your laptop?
7 0
3 years ago
Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
Sindrei [870]

Answer:

Kindly check explanation

Explanation:

Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.

A shell script could be written for a control flow construct :

if [expression]

then (command 1)

else (command 2)

.....

7 0
3 years ago
Other questions:
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • 1. Why was the Internet created?
    8·1 answer
  • Consider the following high-level recursive procedure: long long int flong long int n, long long int k long long int b b k+2; if
    9·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • Given the following code: PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where
    13·1 answer
  • For what reasons do readers use text-to-speech tools? Check all that apply.
    8·2 answers
  • O O O O O O O
    9·1 answer
  • a document contains a list of items that appear in no particular order. what is the best way to format the list
    5·1 answer
  • Who doesn't like reeses
    11·2 answers
  • You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you ca
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!