Which two actions are valid uses of public key infrastructure?

Which two actions are valid uses of public key infrastructure? (Choose two )
A. ensuring the privacy of a certificate
B. revoking the validation of a certificate
C. validating the authenticity of a certificate
D. creating duplicate copies of a certificate
E. changing ownership of a certificate

cisco-exams

9 thoughts on “Which two actions are valid uses of public key infrastructure?

  1. B and C

    A certificate does NOT need to be private hence does not need privacy. A certificate is a public document and has a public key. Answer is B and C .

  2. It gotta be BC. Do not see how public key can ensure privacy of the cert.

    Mod_GuideK, please adjust the answers.

  3. I’m pretty sure the answer is BC. There is no need to ensure the privacy of a certificate because it proves the authenticity of the key pair. If the Private Key is compromised then the certificate will need to be revoked.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.