ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

1. Which of the following pieces of information is not included as part of a digital

certificate?

a. Validity period

b. Private key

c. Signature algorithm identifier

d. Public key