Question: In a two-tier hierarchy CA design, what is a common security best practice?
- The issuing CA servers are placed in different geographical locations.
- The intermediate or policy CA server is offline.
- The root CA server is offline.
- Only FIPS-compliant hardware security modules are used.
Answer: The correct answer of the above question is Option C:The root CA server is offline.