Which of the following is best described as when certificate keys are held in the case that third parties such as government or other organizations need access to encrypted communications?

A. Key escrow
B. CRL
C. CA
D. RA

A. Key escrow is when certificate keys are held by third parties such as governments or other organizations.

Computer Science & Information Technology

You might also like to view...

Text that indicates the type of information to be entered is ________ text

Fill in the blank(s) with correct word

Computer Science & Information Technology

This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems.

A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs

Computer Science & Information Technology