Suppose a system uses a PKI with a CRL. A device in that system is asked to verify a certificate but cannot access the CRL database because of a denial-of-service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?