Which two actions are valid uses of public key infrastructure? (Choose two )

Which two actions are valid uses of public key infrastructure? (Choose two )
A . ensuring the privacy of a certificate
B . revoking the validation of a certificate
C . validating the authenticity of a certificate
D . creating duplicate copies of a certificate
E . changing ownership of a certificate

Answer: BC

Latest 210-250 Dumps Valid Version with 1138 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments