Multiple Choice
Because encryption keys can be lost or destroyed,a copy of the key should be stored with a trusted party.This safety procedure is sometimes called ________.
A) key escrow
B) white hat
C) key encryption
D) biometric authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q53: A user name _ a user.<br>A) authenticates<br>B)
Q56: The broadest definition of _ includes viruses,worms,Trojan
Q57: A problem in a customer billing system
Q58: Every organization must have an incident-response plan
Q59: Which of the following are malware masquerading
Q62: Which of the following is a human
Q63: _ simply take computers with wireless connections
Q64: What should an organization do when a
Q64: Which of the following is a synonym
Q65: A(n)_ is a computer program that senses