An attacker has compromised the private key associated with a certificate.
Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)
An attacker has compromised the private key associated with a certificate.
Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)
To ensure that certificates have not been revoked by the Certification Authority, two commonly used methods are the Online Certificate Status Protocol (OCSP) and the Certificate Revocation List (CRL) located in LDAP. The OCSP is a protocol used to obtain the revocation status of an X.509 digital certificate, providing real-time data. The CRL is a list of certificates that have been revoked by the CA before their scheduled expiration date, which can be accessed through LDAP.
I guess the right answer is the letter CE.