Join IDNLearn.com today and start getting the answers you've been searching for. Find the solutions you need quickly and accurately with help from our knowledgeable community.

A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A.Public Key Infrastructure (PKI) B.Certificate Revocation Lists (CRL) C.Trusted Platform Module (TPM) D.Hardware Security Module (HSM)