Which of the following is not a best practice for cryptographic key management?
A) Keys should be transmitted and stored by secure means.
B) Keys should be properly destroyed when their lifetime ends.
C) Keys should be presented in clear text.
D) Key values should be random, and the full spectrum of the keyspace should be used.
C) Keys should be presented in clear text.
Computer Science & Information Technology
You might also like to view...
Artistic effects emulate all of the following styles EXCEPT ____.
A. painting B. sketching C. typographic D. drawing
Computer Science & Information Technology
Only desktop computers contain drive bays.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology