Question 394:
Attackers have been using revoked certificates for MITM attacks to steal credentials from employees of Company.com. Which of the following options should Company.com implement to mitigate these attacks?
Answer options:
A. Captive portal B. OCSP stapling C. Object identifiers D. Key escrow E. Extended validation certificate