An organization has tasked a cyber security technician with enhancing its framework after recently experiencing a cyber breach. What is the value associated with a public key infrastructure (PKI)?

A. It summates all revoked and suspended certificates and must be accessible to anyone relying on the validity of Certificate Authority's certificates.
B. It is a cryptoprocessor implemented as a module within the central processing unit (CPU) of a computer or mobile device.
C. It is a cryptoprocessor implementing hardware through removable or dedicated form factors, like plug-in peripheral component interconnect express adaptor cards.
D. It is the framework that establishes trust in using public key cryptography to sign and encrypt messages via digital signatures.