The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.
A) key escrow
B) pledged encryption
C) insured encryption
D) key replication
Correct Answer:
Verified
Q63: The creation of backup copies of database
Q64: What are the precautions to be taken
Q65: Viruses, worms, and Trojan horses are types
Q66: Packet-filtering firewalls are the most sophisticated type
Q67: Thomas is responsible for creating backup copies
Q69: _ refers to an organization-wide function that
Q70: Explain the functions performed by packet-filtering firewalls.
Q71: The loss of encryption keys by employees
Q72: Packet-filtering firewalls cannot prohibit outsiders from starting
Q73: A virus is a computer program that
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents