Last Updated on August 14, 2021 by Admin
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet.
Which of the following should be used in the code? (Choose two.)
- Escrowed keys
- SSL symmetric encryption key
- Software code private key
- Remote server public key
- OCSP