Which of the following is best described as when certificate keys are held in the case that third parties such as government or other organizations need access to encrypted communications?
A. Key escrow
B. CRL
C. CA
D. RA
A. Key escrow is when certificate keys are held by third parties such as governments or other organizations.
Computer Science & Information Technology
You might also like to view...
Text that indicates the type of information to be entered is ________ text
Fill in the blank(s) with correct word
Computer Science & Information Technology
This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems.
A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs
Computer Science & Information Technology