1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
14

A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even durin

g an extended internet outage.
Which of the following should be implemented?
A. Recovery agent
B. Ocsp
C. Crl
D. Key escrow
Computers and Technology
1 answer:
Natali [406]3 years ago
5 0

Answer: OCSP

Explanation:

Ocsp(online certificate status protocol) is used to maintain the security status of the server and also to determine the status of SSL/TLS certificates used by the webserver.

You might be interested in
Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
LUCKY_DIMON [66]

Answers:

-Social Engineering

-Dumpster Diving

-Keylogger

4 0
3 years ago
Code embedded into an HTML page and downloaded by a user; resides on the client and helps process Web form input. Common clients
Stels [109]

Answer:

TRUE

Explanation:

8 0
3 years ago
When does technology become assistive technology?
deff fn [24]
Technology becomes assistive technology C. WHEN SOMEONE WITH A DISABILITY OR LIMITATION USES IT TO HELP HIM OR HER DO SOMETHING.

Assistive technology is defined as any technological item, equipment, software or product system that is used to assist individuals with disabilities to increase, improve, and maintain their functional capabilities.
6 0
3 years ago
Read 2 more answers
To save a file so that it can be opened on most computers, select the _____ option.
romanna [79]
Save it on the cloud.
6 0
4 years ago
Read 2 more answers
Which social networking site became a gaming platform after 2009
PtichkaEL [24]

Answer:

Should be Hi5

have good day

3 0
3 years ago
Other questions:
  • How long did it take Linkedln to reach 1 million users?
    5·2 answers
  • What is the keyboard shortcut Ctrl+Z used for?
    14·2 answers
  • Where does a computer store it’s information
    11·1 answer
  • Anybody know this question???
    6·1 answer
  • Which is a common problem for inserting pictures into placeholders?
    10·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
  • You are trying to sell a new product to a store owner. Which method of presentation
    10·1 answer
  • Kinda strange, and im good
    11·2 answers
  • How are most databases organized?
    15·1 answer
  • What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!