A company needs to provide a secure backup mechanism for key storage in a PKI. Which of the following should the company implement?

A. Ephemeral keys
B. Steganography
C. Key escrow
D. Digital signatures


Answer: C. Key escrow

Computer Science & Information Technology

You might also like to view...

Review the organization chart you prepared in Chapter 1 and determine who should be on the JAD team, and why. Also, how will you create a sense of team ownership from the start?

What will be an ideal response?

Computer Science & Information Technology

To handle the key pressed event on a pane p, register the handler with p using ______.

a. p.setOnKeyClicked(handler); b. p.setOnKeyTyped(handler); c. p.setOnKeyReleased(handler); d. p.setOnKeyPressed(handler);

Computer Science & Information Technology

The best method in Windows Server 2008 for resolving host names to IP addresses is to use ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Marking a workbook as final makes the workbook _______, discouraging a user from making any changes to it.

A. write-only B. read-only C. locked D. protected

Computer Science & Information Technology