Your group is hired by Company X to do the following:
a. Use PKI to design an authentication method for desktop clients to authenticate (login) into the company application server.
b. A part of the company that uses a single root CA (with many sub CAs and clients) has an instance of root CA private key compromise. What is your recommendation to management?
Email answers by 11:59pm today.