Which two actions are valid uses of public key infrastructure? (Choose two)
- ensuring the privacy of a certificate
- revoking the validation of a certificate
- validating the authenticity of a certificate
- creating duplicate copies of a certificate
- changing ownership of a certificate
Explanation: The purpose of PKI is the secure distribution of public keys. It helps answer three (3) questions to authenticate a certificate. Is it valid, is it signed and is it revoked.
Exam with this question: CCNA SECFND 210-250 Dumps – Certification Practice Exam Answers
Please login or Register to submit your answer