A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.)
A) Escrowed keys
B) SSL symmetric encryption key
C) Software code private key
D) Remote server public key
E) OCSP
Correct Answer:
Verified
Q691: Joe is exchanging encrypted email with another
Q692: Phishing emails frequently take advantage of high-profile
Q693: A security administrator suspects a MITM attack
Q694: An employee uses RDP to connect back
Q695: An organization requires users to provide their
Q697: Audit logs from a small company's vulnerability
Q698: Joe, the security administrator, sees this in
Q699: A security administrator is tasked with conducting
Q700: Which of the following is the GREATEST
Q701: A security administrator is developing training for
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents