Multiple Choice
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.
A) key escrow
B) asymmetric encryption
C) symmetric encryption
D) biometric authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q54: A person calls the Stark residence and
Q61: While making online purchases, a person should
Q63: Users of smart cards are required to
Q64: Which of the following is a synonym
Q65: Which of the following refers to viruses
Q66: Which of the following is considered a
Q67: _ is a technique for intercepting computer
Q70: Which of the following is a data
Q72: Differentiate between symmetric and asymmetric encryption.
Q77: Viruses, worms, and Trojan horses are types