A systems administrator wants to replace the process of using a CRL to verify certificate validity. Frequent downloads are becoming problematic.
Which of the following would BEST suit the administrator’s needs?
A . OCSP
B . CSR
C . Key escrow
D . CA
Answer: A