7.0k views
5 votes
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet.

Which of the following should be used in the code? (Select TWO.)
A. Escrowed keys
B. SSL symmetric encryption key
C. Software code private key
D. Remote server public key
E. OCSP

1 Answer

2 votes

Answer:

D. Remote server public key

E. OCSP

Step-by-step explanation:

Options D and E are correct because the above question states that its "verifying that a key is valid". This means that it didn't specify which key. Therefore, it sensible that the application wants to verify the validity of the remote host's key. So, in order to use OCSP to verify the validity of that key, that app actually needs the public key of the remote server.

User Sean Turner
by
5.8k points