An attacker has compromised the private key associated with a certificate.
Which two methods can be used to ensure that certificates have not been revoked by the Certification
authority that issued it? (Choose two.)
A . Public Key Information
B . Online Status Certificate Protocol
C . Online Certificate Status Protocol
D . Certificate Rejection List located in LDAP
E . Certificate Revocation List located in LDAP
Answer: AE
Latest C2150-609 Dumps Valid Version with 138 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund