Which choice is not a proper method of managing keys?

A. Memory locations of keys should be overwritten seven times.
B. Keys may be sent to and reused by a different department.
C. Keys frequently in use should be replaced frequently.
D. Key expiration dates should be carefully monitored.


Answer: B. Keys may be sent to and reused by a different department.

Computer Science & Information Technology

You might also like to view...

Java creates an object called a(n) ____ to model problems that occur while a program is running.

A. defect B. exception C. fault D. alert

Computer Science & Information Technology

You only can create hyperlinks to a Web page from your presentation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A dot leader is the most commonly used type of leader, with a dot as the leader ________

A) character B) point C) trail D) path

Computer Science & Information Technology

Which sentence demonstrates correct punctuation??

A. ?Mr. Brown has narrowed the search to the following individuals, Laura Stephens, Amanda Gillis, and Parker Wainwright. B. ?Mr. Brown has narrowed the search to the following individuals:  Laura Stephens, Amanda Gillis, and Parker Wainwright. C. ?Mr. Brown has narrowed the search to the following individuals; Laura Stephens, Amanda Gillis and Parker Wainwright.

Computer Science & Information Technology