Multiple Choice
Because encryption keys can get lost or destroyed,a copy of the key should be stored with a trusted third party.This safety procedure is sometimes called ________.
A) key escrow
B) white hat
C) key encryption
D) biometric authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: How is a Trojan horse different from
Q9: Typically,a help-desk information system has answers to
Q10: Smart cards are convenient and easy to
Q13: System errors are not caused by human
Q21: Creating backup copies of database contents is
Q42: _ occur when bogus services flood a
Q47: _ use(s)personal physical characteristics such as fingerprints,facial
Q48: _ are the patterns that exist in
Q54: Distinguish between phishing,spoofing,and sniffing.
Q77: Viruses, worms, and Trojan horses are types