Which two actions are valid uses of public key infrastructure?(Choose two )

IT Questions BankCategory: CCNA CyberOpsWhich two actions are valid uses of public key infrastructure?(Choose two )

Which two actions are valid uses of public key infrastructure? (Choose two)

  • ensuring the privacy of a certificate
  • revoking the validation of a certificate
  • validating the authenticity of a certificate
  • creating duplicate copies of a certificate
  • changing ownership of a certificate

Explanation: The purpose of PKI is the secure distribution of public keys. It helps answer three (3) questions to authenticate a certificate. Is it valid, is it signed and is it revoked.

Exam with this question: CCNA SECFND 210-250 Dumps – Certification Practice Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x