QuestionJuly 23, 2025

A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A. Public Key Infrastructure (PKI) B. Certificate Revocation Lists (CRL) C. Trusted Platform Module (TPM) D. Hardware Security Module (HSM)

A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A. Public Key Infrastructure (PKI) B. Certificate Revocation Lists (CRL) C. Trusted Platform Module (TPM) D. Hardware Security Module (HSM)
A system administrator reviews network access permissions granted to several devices and revokes their
certificates. What log would reflect these changes?
A. Public Key Infrastructure (PKI)
B. Certificate Revocation Lists (CRL)
C. Trusted Platform Module (TPM)
D. Hardware Security Module (HSM)

Solution
4.4(281 votes)

Answer

B. Certificate Revocation Lists (CRL) Explanation 1. Identify the log reflecting certificate revocation Certificate revocation is tracked in a specific list that records certificates that are no longer valid.

Explanation

1. Identify the log reflecting certificate revocation<br /> Certificate revocation is tracked in a specific list that records certificates that are no longer valid.
Click to rate:

Similar Questions