Multiple Choice
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________.
A) key escrow
B) pledged encryption
C) insured encryption
D) key replication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q25: As one of the safeguards against security
Q26: A(n) _ includes how employees should react
Q27: Technical safeguards involve both software and hardware
Q28: After Equifax was hacked, they went through
Q29: Thomas is responsible for creating backup copies
Q31: A key is a number used with
Q32: Which of the following is a primary
Q33: _ are viruses that masquerade as useful
Q34: All of the following are factors in
Q35: With https, data are encrypted using a