1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
13

A technician who is managing a secure B2B connection noticed the connection broke last night. All networking equipment and media

are functioning as expected, which leads the technician to question certain PKI components. Which of the following should the technician use to validate this assumption? (Choose two)
a. PEM
b. CER
c. SCEP
d. CRL
e. OCSP
f. PFX
Computers and Technology
1 answer:
pashok25 [27]3 years ago
7 0

Answer:

<u>d. CRL</u>

<u>e. OCSP</u>

Explanation:

Note, the term PKI stands for Public Key Infrastructure.

Among all the PKI components, the CRL (CERTIFICATE REVOCATION LISTS), which contains a list of issued certificates that were later revoked by a given Certification Authority, and the PFX format used for storing server certificates should be examined by the technician use to validate his assumption.

You might be interested in
A company produces coffee makers. The labor cost of assembling one coffee maker during the regular business hours is $2.65. If t
DochEvi [55]

Answer:

520

Explanation:

Let's say the x = smallest number of units that must be assembled during the regular hours, and 660-x is the number of units that can be assembled in overtime. Then, the total cost should be smaller than or equal to cost1 *x + cost2*3.75

⇒ (x * 2.65) + ((660 - x) * 3.75) <= 1903

⇒ x * (2.65 - 3.75) + (660 * 3.75) <= 1903

⇒ 1.1 * x >= 2475 - 1903

⇒ 1.1 * x >= 572

⇒ x >= 520

6 0
4 years ago
Which of the following is an example of an output device on a smartphone?
Andru [333]

Answer:

The speaker

Explanation:

Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.

7 0
3 years ago
1) State one change you could make to a CPU to make a computer work faster.
Darina [25.2K]

Answer:

<h2><em><u>Mark</u></em><em><u> me</u></em><em><u> as</u></em><em><u> a</u></em><em><u> Brainliest</u></em><em><u> pls</u></em></h2>

Explanation:

1)

  • removing cache and tmp files
  • Changing the processor
  • Upgrading the ram
  • Removing the maximum Graphics of the computer
  • could make to a CPU to make a computer work faster.

2)

  • Input source
  • output source

I hope this answer is helpful to you

8 0
3 years ago
What does a file extension tell you?
kiruha [24]

A. because everyone basically has seen it..

3 0
3 years ago
Anne wants to hide her age by converting it from 13 to 1101. Which number system is Anne converting to?
Misha Larkins [42]

Answer:

The correct answer is: Option A: Binary

Explanation:

Annie is converting her age from 13 to 1101.

The binary number system is a two-digit number system that only consists of zeroes and ones.

We can see that the number system Anne is converting to, only consists of two combination of two digits 0 and 1.

Moreover, we can convert 13 to binary to see

2   13

2    6 - 1

2    3 - 0

      1 - 1

Hence,

The correct answer is: Option A: Binary

7 0
3 years ago
Other questions:
  • Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources. Which of the
    7·1 answer
  • When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
    10·1 answer
  • Which term is used to define the wires on a motherboard that move data from one part of a computer to another?
    13·1 answer
  • Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
    11·1 answer
  • So whenever I play among us, I always get killed. Like always. I want to know some Technics to being a crew mate and an impostor
    9·1 answer
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
    6·1 answer
  • 3. Choose the right statement bellow: Excel can not import external data from
    9·1 answer
  • Need help not sure if I’m correct
    5·1 answer
  • Can anyone provide a good java program that shows how to implement a button?
    11·2 answers
  • The short-range two-way communication technology behind contactless payments is called ____.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!