Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party.This procedure is called ________.
A) Kerberos
B) spoofing
C) brute force
D) key escrow
Correct Answer:
Verified
Q30: Define threat, vulnerability, safeguard, and target.
Q39: What are the three general sources of
Q59: Users of smart cards are required to
Q86: What is key escrow?
Q91: With _ encryption, the sender and receiver
Q97: Which of the following observations concerning Secure
Q99: The term _ refers to any type
Q100: A(n)_ card has a microchip in it
Q103: When an employee is terminated, IS administrators
Q106: Many companies create _, which are false
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents