An attacker has compromised the private key associated with a certificate.
Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)
A. Public Key Information
B. Online Status Certificate Protocol
C. Online Certificate Status Protocol
D. Certificate Rejection List located in LDAP
E. Certificate Revocation List located in LDAP