Which of the following can Sara, a security administrator, implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?

A. Private key rings
B. Trust models
C. Registration
D. Key escrow


Answer: D. Key escrow

Computer Science & Information Technology

You might also like to view...

Compare how the if statement and the switch statement are alike (site 3 ways). Explain how they’re not alike (site 2 ways).

What will be an ideal response?

Computer Science & Information Technology

A linked object becomes a part of the destination file

Indicate whether the statement is true or false

Computer Science & Information Technology

Write a statement that adds the contents of the txtNum1 control to the contents of the txtNum2 control, and then multiplies the result by 5. The result is displayed in the lblResult control.

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.

What will be an ideal response?

Computer Science & Information Technology