Which two actions are valid uses of public key infrastructure? (Choose two )
A. ensuring the privacy of a certificate
B. revoking the validation of a certificate
C. validating the authenticity of a certificate
D. creating duplicate copies of a certificate
E. changing ownership of a certificate
B and C
+1 for B and C
When the river sound..is because the rock partners have reason.
BC for sure.
B and C
A certificate does NOT need to be private hence does not need privacy. A certificate is a public document and has a public key. Answer is B and C .
It gotta be BC. Do not see how public key can ensure privacy of the cert.
Mod_GuideK, please adjust the answers.
i think so too
I’m pretty sure the answer is BC. There is no need to ensure the privacy of a certificate because it proves the authenticity of the key pair. If the Private Key is compromised then the certificate will need to be revoked.
I am with you Josh!