Multiple Choice
Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party called a(n)
A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q47: After installing anti-virus and antispyware, what is
Q48: Firewalls produce _ of their activities, which
Q49: An organization's security _ has three components:
Q50: To protect against lost or sabotaged encryption
Q51: A(n) _ must be entered when using
Q53: A retinal scan would be considered a
Q54: Unauthorized data disclosure can occur by simple
Q55: What is the idea of a single
Q56: Sometimes, just opening a webpage can install
Q57: A hacker can launch a denial-of-service attack