Which of the following is not a best practice for cryptographic key management?

A) Keys should be transmitted and stored by secure means.
B) Keys should be properly destroyed when their lifetime ends.
C) Keys should be presented in clear text.
D) Key values should be random, and the full spectrum of the keyspace should be used.


C) Keys should be presented in clear text.

Computer Science & Information Technology

You might also like to view...

The ________ of a chart is the region containing the graphical representation of the values in a data series

Fill in the blank(s) with correct word

Computer Science & Information Technology

PDF file format is XML Paper Specifications

Indicate whether the statement is true or false

Computer Science & Information Technology

Standards for Web content are created and overseen by an organization called the _____.

A. SG3 B. Internet2 C. W3C D. HTTP

Computer Science & Information Technology

In the following equation under what conditions would Priority Use be True?

a. Valid Card is True, Time Noted is True, Computer is True, Guest Card is False. b. Valid Card is False, Time Noted is True, Computer is False, Guest Card is True. c. Valid Card is True, Time Noted is False, Computer is True, Guest Card is False. d. All of the above.

Computer Science & Information Technology