A technician, who is managing a secure B2B connection, noticed the connection broke last night. All networking equipment and media are functioning as expected, which leads the technician to question-certain PKI components. Which of the following should the technician use to validate this assumption? (Choose two.)
A. PEM
B. CER
C. SCEP
D. CRL
E. OCSP
F. PFX