Administrative controls relating to the security of private keys can be employed by including a __________ (which includes date and time) and to require prompt reporting of compromised keys to a central authority.

Fill in the blank(s) with the appropriate word(s).

timestamp

Computer Science & Information Technology

You might also like to view...

The small text files that websites put on your computer to store information about you and your preferences are called ________

A) cookies B) pop-ups C) sponsored links D) favorites

Computer Science & Information Technology

?____ attacks use all possible combination of letters, numbers, and special characters to determine the target password.

A. ?Brute-force B. ?Dictionary C. ?Hybridization D. ?LC5

Computer Science & Information Technology