Multiple Choice
Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party.This procedure is called ________.
A) Kerberos
B) spoofing
C) brute force
D) key escrow
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q45: In symmetric encryption, two different keys are
Q54: Which of the following systems procedures is
Q55: Safeguards increase work efficiency by making common
Q57: _, tiny files that gather demographic information,
Q60: A retina scan is a biometric authentication
Q61: What is a hot site? How is
Q62: _ refers to things we do not
Q71: List various personal security safeguards.
Q81: With _ encryption, the sender and receiver
Q109: _ is the process of transforming clear