Which of the following can Sara, a security administrator, implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
A. Private key rings
B. Trust models
C. Registration
D. Key escrow
Answer: D. Key escrow
Computer Science & Information Technology
You might also like to view...
Compare how the if statement and the switch statement are alike (site 3 ways). Explain how they’re not alike (site 2 ways).
What will be an ideal response?
Computer Science & Information Technology
A linked object becomes a part of the destination file
Indicate whether the statement is true or false
Computer Science & Information Technology
Write a statement that adds the contents of the txtNum1 control to the contents of the txtNum2 control, and then multiplies the result by 5. The result is displayed in the lblResult control.
What will be an ideal response?
Computer Science & Information Technology
A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.
What will be an ideal response?
Computer Science & Information Technology