_____ refers to a situation in which keys are managed by a third party, such as a trusted CA.

A. Key authorization
B. Key escrow
C. Remote key administration
D. Trusted key authority

Answer: B. Key escrow

Computer Science & Information Technology

You might also like to view...

___________ encryption uses a single, private key to both encrypt and decrypt data

a. Asymmetric b. Symmetric c. Secure d. Clear

Computer Science & Information Technology

ebXML is an acronym for_________.

What will be an ideal response?

Computer Science & Information Technology