Because encryption keys can be lost or destroyed,a copy of the key should stored with a trusted third party.This procedure is called ________.
A) control account
B) authentication deposit
C) encryption herding
D) key escrow
Correct Answer:
Verified
Q90: _ are viruses that masquerade as useful
Q101: Which of the following is a technique
Q102: _ is a method of mathematically manipulating
Q103: A(n)_ is a type of virus that
Q104: About 90 percent of all viruses are
Q105: Organizations should protect sensitive data by storing
Q107: You are doing an online fund transfer
Q108: What is a major difference between spyware
Q109: _ encryption uses the same key for
Q110: Because encryption slows processing,most messages are sent
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents