Two users need to securely share encrypted files via email. Company policy prohibits users from sharing credentials or exchanging encryption keys. Which of the following can be implemented to enable users to share encrypted data while abiding by company policies?
A. Key escrow
B. Digital signatures
C. PKI
D. Hashing
Answer: B. Digital signatures
Computer Science & Information Technology
You might also like to view...
Active fingerprinting is more powerful but has a higher potential of being discovered
Indicate whether the statement is true or false.
Computer Science & Information Technology
If a collision has occurred on an Ethernet network, the cable is restricted to the nodes whose data collided until they have finished retransmitting.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ____________________ is a large initial capital letter in a paragraph.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A main operand description can have a maximum number of ____________________ characters.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology