Multiple Choice
Because encryption keys can be lost or destroyed,a copy of the key should stored with a trusted third party.This procedure is called ________.
A) control account
B) authentication deposit
C) encryption herding
D) key escrow
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q59: Secure Socket Layer (SSL) is a protocol
Q78: What is key escrow?
Q127: Public keys are supplied by third parties
Q129: Which of the following is an example
Q130: What is SSL and how does it
Q131: An example of a human mistake is
Q132: Everyone in the department must adequately safeguard
Q133: Which of the following presents the largest
Q135: Organizations need a rehearsed incident-response plan in
Q137: Maintaining the DBMS on computers in a