A company needs to provide a secure backup mechanism for key storage in a PKI. Which of the following should the company implement?
A. Ephemeral keys
B. Steganography
C. Key escrow
D. Digital signatures
Answer: C. Key escrow
You might also like to view...
Review the organization chart you prepared in Chapter 1 and determine who should be on the JAD team, and why. Also, how will you create a sense of team ownership from the start?
What will be an ideal response?
To handle the key pressed event on a pane p, register the handler with p using ______.
a. p.setOnKeyClicked(handler); b. p.setOnKeyTyped(handler); c. p.setOnKeyReleased(handler); d. p.setOnKeyPressed(handler);
The best method in Windows Server 2008 for resolving host names to IP addresses is to use ____________________.
Fill in the blank(s) with the appropriate word(s).
Marking a workbook as final makes the workbook _______, discouraging a user from making any changes to it.
A. write-only B. read-only C. locked D. protected