1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
3 years ago
11

A security administrator is required to submit a new csr to a ca. what is the first step?

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
4 0
If an administrator needs to renew a certificate for a web server he/she should submit the CSR (Certificate Signing Request) to CA.
<span>If a security administrator is required to submit a new CSR to a CA, teh fisrt step the administrator should do is to g</span>enerate a new private key based on RSA.
You might be interested in
Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly comp
tatiyna

Answer:

teach the assistant bits and pieces of the program.

Explanation:

Given that the program is fairly complex and has many independent components, the most ideal way Nilsu should train a new administrative assistant on using a word processing program is by "teaching the assistant bits and pieces of the program."

This will make the administrative assistant understand and operate the program at a gradual pace without anhthing looking confusing.

5 0
3 years ago
What is mean by computer ?where it is used?​
dem82 [27]

Answer:

computer is a set consisting of hardware and software that perform specific set of instructions

Explanation:

thy are used in hospitals, institute,hotels

4 0
3 years ago
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence
igomit [66]

Answer:

Data recovery

Explanation:

Data recovery -

It is the method involved in computer , where the lost , damaged or corrupted file or data is gained back again , is referred to as data recovery.

The information is recorded by some secondary method , when the file cannot be accessed in the original manner.

Hence , from the given scenario of the question,

The correct term is data recovery.

4 0
3 years ago
A(n) sentinel is a special value that marks the end of a sequence of items.
Anuta_ua [19.1K]

Answer:

Sentinel value

Explanation:

It is the sentinel value in computer programming which is also being termed as the flag value, rogue value, dummy data signal value or the trip value. It has its meaning in the context of the algo, and that clarifies that it is the end of the block or code basically inside a loop or in any kind of recursive algo.

7 0
3 years ago
Which shortcut key in Microsoft Word 2016 will launch Spell Checker?
Pie

Alt + F7 will launch spell checker

4 0
3 years ago
Read 2 more answers
Other questions:
  • As they relate to databases, which of the following describes forms? A. Forms are specified conditions used for retrieving recor
    12·2 answers
  • A species of snake lives in a rainforest. Which would be an adaptation for this
    10·2 answers
  • What file extension is used to name a compressed folder
    10·1 answer
  • What is the difference between the Internet and the World Wide Web? Explain in your own words.
    13·2 answers
  • You compared each letter in the correct word to the letter guessed.
    5·1 answer
  • 3 uses of Microsoft word in hospital
    10·1 answer
  • Which of the following You tubers uses the word "flip" as a curse word
    8·2 answers
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • 0 % 3? Is it 0 or undefined? (% is mod)
    9·1 answer
  • Write. true or false​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!