Key escrow is a(n) ________.
A. protocol used to secure communication over the internet
B. encryption algorithm that uses both public and private keys
C. device that prevents unauthorized network access
D. safety procedure that allows a trusted party to have a copy of the encryption key
E. the creation of related public and private keys
Answer: D
You might also like to view...
Margaret went to the mall to meet her sister, Val. While at the mall, they witnessed a back-to-school fashion show in a store. They took a walk and watched the children play in the center arena. Which benefit of store shopping did Margaret and Val enjoy?
A. Touch and feel products B. Immediate Gratification C. Entertainment and social interaction D. Personal service E. Convenience
_______________________________ is a strategy for regaining competitive advantage by creating a corporate culture of constant change and small improvements.
Fill in the blank(s) with the appropriate word(s).
Which of the following is not a motive for the embezzlement of cash by employees?
A. Ownership of cash is difficult to prove B. Cash has universal appeal C. Small quantities of high-denomination currency can represent significant value D. Cash is the common unit of measurement
The duty of loyalty:
a. requires a principal to place the agent's interests before the principal's personal interests or those of any third party b. requires an agent to place the principal's interests before the agent's personal interests or those of any third party c. requires the agent to work for only one principal at a time d. requires the agent to work without compensation if necessary e. refers to the medieval roots of agency law