A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A.Public Key Infrastructure (PKI) B.Certificate Revocation Lists (CRL) C.Trusted Platform Module (TPM) D.Hardware Security Module (HSM)