1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
2 years ago
7

The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to

be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL.
Computers and Technology
1 answer:
Step2247 [10]2 years ago
8 0

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

You might be interested in
A(n) ____ describes the structure, content, and access controls of a physical data store or database.
kirill115 [55]

A <u>schema </u>describes the structure, content, and access controls of a physical data store or database.

<h3>What is the kind of database that stores data in a different physical location?</h3>

Distributed databases are that are distributed across several physical locations. In distributed databases, the data are placed where they are used most often, but the whole database is available to each licensed user.

<h3>What is the structure of database management system?</h3>

The database system is separated into three components: Query Processor, Storage Manager, and Disk Storage.

To learn more about Distributed databases, refer

brainly.com/question/28236247

#SPJ4

Complete Question is ,

a. relation

b. DBMS

c. schema

d. attribute

6 0
2 years ago
In C complete the following:
Crazy boy [7]

Answer:

#include <stdio.h>

void printValues ( unsigned char *ptr, int count) // count is no of cells

{

 for(int i=0; i<count; i++) {

   printf("%d ", ptr[i]);

 }

}

int main ( )

{

 unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;

 printValues( data, sizeof(data)/sizeof(data[0]) );

}

Explanation:

Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.

3 0
3 years ago
Message queues allow for programs to synchronize their operations as well as transfer data. How much data can be sent in a singl
ser-zykov [4K]

The maximum size of a message queue is 16384 bytes for Linux. For IBM WebSphere MQ. this value is 4 MB.

<h3>What is the message queue?</h3>

The size of the message queue refers to the size (in bytes) that a message may have for a given operative system.

For example, the maximum value for IBM WebSphere MQ has been configured in four megabytes (4 MB).

In this case, when the message is higher than the set size (here 4 MB), then this message is returned.

Learn more about IBM here:

brainly.com/question/896257

6 0
3 years ago
What are motion graphics?
AysviL [449]
D)Animated abstract shapes
3 0
3 years ago
When typing an outline, you can move a point from a lower level to a higher level by changing the list level from the outline me
Arte-miy333 [17]
A shift+Tab
I hope it’s work
6 0
3 years ago
Other questions:
  • What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
    7·1 answer
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • 3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s
    11·1 answer
  • True or False (type the entire word)
    11·1 answer
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • Write a program to read 10 integers from an input file and output the average, minimum, and maximum of those numbers to an outpu
    14·1 answer
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
  • Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
    14·1 answer
  • Why is my internet slow even though the speed test says it is fast
    12·1 answer
  • Which popular video game franchise has released games with the subtitles World At War and Black Ops?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!