Which of the following is not a best practice for cryptographic key management?

A) Keys should be transmitted and stored by secure means.
B) Keys should be properly destroyed when their lifetime ends.
C) Keys should be presented in clear text.
D) Key values should be random, and the full spectrum of the keyspace should be used.

C) Keys should be presented in clear text.

Computer Science & Information Technology

You might also like to view...

Artistic effects emulate all of the following styles EXCEPT ____.

A. painting B. sketching C. typographic D. drawing

Computer Science & Information Technology

Only desktop computers contain drive bays.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology